Sciweavers

762 search results - page 89 / 153
» Modeling and Simulating Information Security Management
Sort
View
MOBISYS
2007
ACM
14 years 7 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
ISN
1995
Springer
13 years 11 months ago
Intelligent Remote Monitoring
Intelligent monitoring facilities are of paramount importance in both service and network management as they provide the capability to monitor quality of service and utilisation pa...
George Pavlou, Kevin M. T. McCarthy, George Mykoni...
CCS
2011
ACM
12 years 7 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
CONTEXT
2007
Springer
14 years 2 months ago
Context-Sensitivity of Human Memory: Episode Connectivity and Its Influence on Memory Reconstruction
This paper is testing a DUAL-based model of memory. The model assumes decentralized representation of episodes as a coalition of agents and analogical transfer processes as the bas...
Boicho N. Kokinov, Georgi Petkov, Nadezhda Petrova
MASCOTS
2003
13 years 9 months ago
Using User Interface Event Information in Dynamic Voltage Scaling Algorithms
Increasingly, mobile computers use dynamic voltage scaling (DVS) to reduce CPU voltage and speed and thereby increase battery life. To determine how to change voltage and speed wh...
Jacob R. Lorch, Alan Jay Smith