Sciweavers

366 search results - page 39 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
JCP
2008
142views more  JCP 2008»
13 years 8 months ago
Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security
Inter-Organizational Workflows (IOWF) become important as they provide solution for data sharing, heterogeneity in resources and work coordination at global level. However, a secur...
Boleslaw Mikolajczak, Nirmal Gami
ISW
2004
Springer
14 years 2 months ago
A Distributed High Assurance Reference Monitor
Abstract Ajay Chander1 , Drew Dean2 , and John Mitchell3 1 DoCoMo Communications Laboratories USA, San Jose, CA 95110 2 Computer Science Laboratory, SRI International, Menlo Park, ...
Ajay Chander, Drew Dean, John C. Mitchell
NLUCS
2008
13 years 10 months ago
Ontology-driven Vaccination Information Extraction
Increasingly, medical institutions have access to clinical information through computers. The need to process and manage the large amount of data is motivating the recent interest ...
Liliana Ferreira, António Teixeira, Jo&atil...
TWC
2008
99views more  TWC 2008»
13 years 8 months ago
Cross layer dynamic resource allocation with targeted throughput for WCDMA data
We consider resource allocation for elastic wireless applications that measure utility by target connection average throughput and achieved throughput. We construct a framework for...
Peifang Zhang, Scott Jordan
IHI
2012
353views Healthcare» more  IHI 2012»
12 years 4 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad