Sciweavers

182 search results - page 28 / 37
» Information Flow in Disaster Management Systems
Sort
View
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 7 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
14 years 1 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson
HICSS
2003
IEEE
148views Biometrics» more  HICSS 2003»
14 years 21 days ago
Strategies for the Successful Implementation of Workflow Systems within Healthcare: A Cross Case Comparison
The implementation of computerized workflow systems to support the collection and dissemination of patient information has been an area of focus in healthcare for many years. This...
Meg Murray
WISA
2007
Springer
14 years 1 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
ETELEMED
2009
IEEE
164views Healthcare» more  ETELEMED 2009»
13 years 5 months ago
Research Challenges for Achieving Healthcare Business Process Interoperability
- E-Health systems' interoperability constitutes one of the main challenges of the IT society. E-Health interoperability will not occur without a shared policy and a process f...
Dimitrios Alexandrou, Gregoris Mentzas