Sciweavers

438 search results - page 65 / 88
» Activity-based Access Control Model to Hospital Information
Sort
View
ESORICS
2004
Springer
14 years 1 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
CCS
2011
ACM
12 years 8 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
CDC
2010
IEEE
148views Control Systems» more  CDC 2010»
13 years 3 months ago
Distributed parameter estimation in networks
In this paper, we present a model of distributed parameter estimation in networks, where agents have access to partially informative measurements over time. Each agent faces a loca...
Kamiar Rahnama Rad, Alireza Tahbaz-Salehi
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
13 years 3 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
KES
2008
Springer
13 years 7 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail