Sciweavers

1401 search results - page 99 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
CSFW
2012
IEEE
11 years 11 months ago
Information-Flow Security for a Core of JavaScript
—Tracking information flow in dynamic languages remains an important and intricate problem. This paper makes substantial headway toward understanding the main challenges and res...
Daniel Hedin, Andrei Sabelfeld
GLOBECOM
2010
IEEE
13 years 7 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
IEEEIAS
2007
IEEE
14 years 3 months ago
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy
Recently, administration of RBAC systems using a role-based approach has become very appealing because of the benefits that such an approach typically brings. This approach uses R...
Yue Zhang 0002, James B. D. Joshi
CSCW
2006
ACM
14 years 2 months ago
Representations at work: a national standard for electronic health records
Representations are at work in IT technology. As plans of and for work, they enable cooperation, coordination, accountability and control, which have to be balanced off against ea...
Claus Bossen
ESCIENCE
2006
IEEE
14 years 3 months ago
Communication over a Secured Heterogeneous Grid with the GriddLeS Runtime Environment
Scientific workflows are a powerful programming technique for specifying complex computations using a number of otherwise independent components. When used in a Grid environment, ...
Jagan Kommineni, David Abramson, Jefferson Tan