Sciweavers

762 search results - page 9 / 153
» Modeling and Simulating Information Security Management
Sort
View
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
13 years 11 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
ESM
2000
13 years 9 months ago
Multi-agent architecture for distributed simulation: Teaching application for industrial management
We are located in the context of the simulation of complex industrial systems, which are distributed in geographical, decisional and informational terms. This paper is divided int...
Stéphane Galland, Frédéric Gr...
INAP
2001
Springer
14 years 1 days ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
CCS
2004
ACM
14 years 1 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
CONTEXT
2007
Springer
14 years 1 months ago
The User Model and Context Ontology GUMO Revisited for Future Web 2.0 Extensions
Dominik Heckmann, Eric Schwarzkopf, Junichiro Mori...