Sciweavers

626 search results - page 14 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
ACISP
2003
Springer
14 years 27 days ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
SBP
2012
Springer
12 years 3 months ago
Creating Interaction Environments: Defining a Two-Sided Market Model of the Development and Dominance of Platforms
Interactions between individuals, both economic and social, are increasingly mediated by technological systems. Such platforms facilitate interactions by controlling and regularizi...
Walter E. Beyeler, Andjelka Kelic, Patrick D. Finl...
CSCW
2004
ACM
13 years 7 months ago
Small-Scale Classification Schemes: A Field Study of Requirements Engineering
Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handlin...
Morten Hertzum
MMM
1996
Springer
287views Multimedia» more  MMM 1996»
13 years 11 months ago
Holographic Images in Multimedia Information Systems
Multimedia information systems are based on the evolving capability of computers to handle diverse types of information. Their most important characteristic is the integration of ...
Lucilla Croce Ferri
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
13 years 9 months ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...