Sciweavers

762 search results - page 56 / 153
» Modeling and Simulating Information Security Management
Sort
View
JMS
2006
90views more  JMS 2006»
13 years 7 months ago
Healthcare Informatics Research: From Data to Evidence-Based Management
Healthcare informatics research is a scientific endeavor that applies information science, computer technology, and statistical modeling techniques to develop decision support syst...
Thomas T. H. Wan
CCS
2010
ACM
13 years 6 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
CONTEXT
2003
Springer
14 years 29 days ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...
TKDE
2002
112views more  TKDE 2002»
13 years 7 months ago
Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems
Database systems for real-time applications must satisfy timing constraints associated with transactions. Typically, a timing constraint is expressed in the form of a deadline and ...
Chanjung Park, Seog Park, Sang Hyuk Son
GI
2003
Springer
14 years 28 days ago
Policy Based Management for Critical Infrastructure Protection
: Our current societies are fully dependent on large complex critical infrastructures (LCCIs). These LCCIs are large scale distributed systems that are highly interdependent, both ...
Gwendal Le Grand, Franck Springinsfeld, Michel Rig...