Sciweavers

2270 search results - page 195 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
113
Voted
AVBPA
2001
Springer
117views Biometrics» more  AVBPA 2001»
15 years 8 months ago
Hand Recognition Using Implicit Polynomials and Geometric Features
Person identification and verification using biometric methods is getting more and more important in today’s information society; resulting in increased utilization of systems th...
Cenker Öden, Aytül Erçil, Vedat T...
JSW
2008
110views more  JSW 2008»
15 years 3 months ago
An Open Approach for the Applied Pi Calculus
A notion of open bisimulation is proposed for the Applied Pi Calculus, which extends -calculus in order to facilitate analyzing security protocols. Our notion is based on the label...
Han Zhu, Yonggen Gu, Xiaohong Wu
WWW
2008
ACM
16 years 4 months ago
Enabling secure digital marketplace
The fast development of the Web provides new ways for effective distribution of network-based digital goods. A digital marketplace provides a platform to enable Web users to effec...
Hongxia Jin, Vladimir Zbarsky
139
Voted
DBSEC
2000
110views Database» more  DBSEC 2000»
15 years 5 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
IHI
2012
217views Healthcare» more  IHI 2012»
13 years 11 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...