Sciweavers

1401 search results - page 73 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
CCS
2008
ACM
13 years 11 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 6 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
ECEH
2007
133views Healthcare» more  ECEH 2007»
13 years 10 months ago
Goals and Challenges for the Realization of a European wide eHealth Infrastructure
: A number of Electronic Health Record (EHR) standards and frameworks have been developed to assist with the interoperability and integration of distributed EHR information. Ideall...
Andreas Thiel, Marco Eichelberg, Berthold B. Wein,...
FM
2008
Springer
130views Formal Methods» more  FM 2008»
13 years 10 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
TSMC
2008
162views more  TSMC 2008»
13 years 8 months ago
A New Model for Secure Dissemination of XML Content
Abstract--The paper proposes an approach to content dissemination that exploits the structural properties of an Extensible Markup Language (XML) document object model in order to p...
Ashish Kundu, Elisa Bertino