Sciweavers

392 search results - page 41 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
TRUSTBUS
2007
Springer
14 years 4 months ago
The Meaning of Logs
While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not ...
Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
GLVLSI
2007
IEEE
141views VLSI» more  GLVLSI 2007»
14 years 2 months ago
A synchronization algorithm for local temporal refinements in perfectly synchronous models with nested feedback loops
he abstract and simple computation and communication mechanism in the synchronous computational model it is easy to simulate synchronous systems and to apply formal verification m...
Tarvo Raudvere, Ingo Sander, Axel Jantsch
EDOC
2009
IEEE
14 years 5 months ago
Modelling and Reasoning Languages for Social Networks Policies
—Policy languages (such as privacy and rights) have had little impact on the wider community. Now that Social Networks have taken off, the need to revisit Policy languages and re...
Guido Governatori, Renato Iannella
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
14 years 11 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
WISA
2007
Springer
14 years 4 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang