Sciweavers

294 search results - page 19 / 59
» Analyzing Consistency of Security Policies
Sort
View
PET
2009
Springer
13 years 12 months ago
Regulating Privacy in Wireless Advertising Messaging: FIPP Compliance by Policy vs. by Design
This research analyzes consumer privacy issues pertaining to the newly developing wireless marketing context, specifically, wireless advertising messaging (WAM). We develop a conce...
Heng Xu, John W. Bagby, Terence Ryan Melonas
CCS
1998
ACM
13 years 11 months ago
A Security Architecture for Computational Grids
State-of-the-art and emerging scientific applications require fast access to large quantities of data and commensurately fast computational resources. Both resources and data are ...
Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven...
IEEEARES
2007
IEEE
14 years 1 months ago
A Pattern System for Security Requirements Engineering
We present a pattern system for security requirements engineering, consisting of security problem frames and concretized security problem frames. These are special kinds of proble...
Denis Hatebur, Maritta Heisel, Holger Schmidt
NDSS
2007
IEEE
14 years 1 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
IJMI
2007
140views more  IJMI 2007»
13 years 7 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson