Sciweavers

536 search results - page 20 / 108
» Embedding Information Security into the Organization
Sort
View
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
14 years 8 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
SACMAT
2009
ACM
14 years 25 days ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
EMSOFT
2006
Springer
13 years 12 months ago
Energy adaptation for multimedia information kiosks
Video kiosks increasingly contain powerful PC-like embedded processors, allowing them to display video at a high level of quality. Such video display, however, entails significant...
Richard Urunuela, Gilles Muller, Julia L. Lawall
CHIMIT
2008
ACM
13 years 10 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
MOCOMED
2003
13 years 9 months ago
PDA-based decision support and documentation for transplantation surgery data
: The Transplantation Unit of the Technical University of Munich has developed a mobile, handheld based application for preoperative transplantation patient management. It provides...
Andreas Krause, Alexander T. Mehlhorn, Dominik Har...