Sciweavers

1401 search results - page 95 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
JCS
2008
94views more  JCS 2008»
13 years 8 months ago
Preprocessing for controlled query evaluation with availability policy
Controlled Query Evaluation (CQE) defines a logical framework to protect confidential information in a database. By modeling a user's a priori knowledge appropriately, a CQE ...
Joachim Biskup, Lena Wiese
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
14 years 2 months ago
Evaluating Telemedicine Systems Success: A Revised Model
Broadly, telemedicine refers to the use of information and telecommunication technologies to distribute information and/or expertise necessary for healthcare service provision, co...
Paul Jen-Hwa Hu
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 3 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
ISSE
2010
13 years 7 months ago
A second look at Faster, Better, Cheaper
“Faster, Better, Cheaper” (FBC) was a systems development methodology used by NASA in the 1990s. While usually a deprecated practice, we find that, with certain caveats, it is...
Oussama El-Rawas, Tim Menzies
SIGSOFT
2008
ACM
14 years 9 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...