Sciweavers

1401 search results - page 75 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
DBKDA
2009
IEEE
88views Database» more  DBKDA 2009»
14 years 4 days ago
Replay the Execution History of Rule-Based Information
Software systems in health care, such as disease and medical-record management, or financial applications, such as customer relationship and portfolio management, have very often...
Essam Mansour, Hagen Höpfner
ASIASIM
2004
Springer
14 years 2 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
COORDINATION
2004
Springer
14 years 2 months ago
Enforcement of Communal Policies for P2P Systems
Abstract. We consider the question of how to establish and enforce communal policies for peer-to-peer (P2P) communities. Generally, members of each P2P community must conform to an...
Mihail F. Ionescu, Naftaly H. Minsky, Thu D. Nguye...
CCS
2008
ACM
13 years 11 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
ENTCS
2007
113views more  ENTCS 2007»
13 years 8 months ago
On the Decidability of the Safety Problem for Access Control Policies
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...
E. Kleiner, T. Newcomb