Sciweavers

773 search results - page 74 / 155
» An iTask Case Study: A Conference Management System
Sort
View
PET
2004
Springer
14 years 2 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 9 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
JCIT
2007
96views more  JCIT 2007»
13 years 8 months ago
A Paper-Centred Information System: Effectiveness and Quality Implications in UK Police Intelligence Units
This paper investigates the quality of information and intelligence in the United Kingdom’s (UK) police intelligence units with a particular emphasis on the role of paper-based ...
Gabriella Spinelli, Bhavna Sharma
FMOODS
2007
13 years 10 months ago
A Probabilistic Formal Analysis Approach to Cross Layer Optimization in Distributed Embedded Systems
We present a novel approach, based on probabilistic formal methods, to developing cross-layer resource optimization policies for resource limited distributed systems. One objective...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
IJMI
2007
134views more  IJMI 2007»
13 years 8 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll