Sciweavers

51 search results - page 10 / 11
» Information ethics for and from Africa
Sort
View
ICSE
2008
IEEE-ACM
14 years 8 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
SIGIR
2006
ACM
14 years 1 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
ACSAC
2009
IEEE
14 years 2 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
MMMACNS
2005
Springer
14 years 29 days ago
Models and Analysis of Active Worm Defense
Abstract. The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block...
David M. Nicol, Michael Liljenstam
ATAL
2004
Springer
14 years 26 days ago
Strategic Deception in Agents
CHRISTIAN, DAVID B. Strategic Deception in Agents. (Under the direction of Assistant Professor R. Michael Young). Despite its negative ethical connotations, deception is a useful ...
David B. Christian, R. Michael Young