We conducted a field-based study examining informal nursing information. We examined the use of this information before and after the adoption of a CPOE (Computerized Provider Ord...
Beginning with the adoption of the de-facto standard for wireless LAN communications IEEE 802.11 in 1999 we can observe a continuous growth of public wireless LAN hotspots that pro...
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...