Sciweavers

1401 search results - page 86 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
14 years 20 days ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
NBIS
2007
Springer
14 years 3 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
IFIPTM
2010
97views Management» more  IFIPTM 2010»
13 years 7 months ago
Securing Class Initialization
Abstract. Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. Although much progre...
Keiko Nakata, Andrei Sabelfeld
ECAI
2006
Springer
14 years 18 days ago
Advanced Policy Explanations on the Web
Abstract. The frameworks for protecting security and privacy can be effective only if common users--with no training in computer science or logic--increase their awareness and cont...
Piero A. Bonatti, Daniel Olmedilla, Joachim Peer
EDBT
2012
ACM
262views Database» more  EDBT 2012»
11 years 11 months ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam