Sciweavers

6555 search results - page 172 / 1311
» Secure attribute-based systems
Sort
View
118
Voted
ACSAC
2001
IEEE
15 years 6 months ago
The Performance Measurement of Cryptographic Primitives on Palm Devices
We developed and evaluated several cryptographic system libraries for Palm OS
Duncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan
117
Voted
XMLSEC
2003
ACM
15 years 7 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
ESORICS
2007
Springer
15 years 8 months ago
What, Indeed, Is Intransitive Noninterference?
Abstract. This paper argues that Haigh and Young’s definition of noninterference for intransitive security policies admits information flows that are not in accordance with the...
Ron van der Meyden
CSSE
2008
IEEE
15 years 9 months ago
A Markov Game Theory-Based Risk Assessment Model for Network Information System
—Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present ...
Cui Xiaolin, Xiaobin Tan, Zhang Yong, Hongsheng Xi
167
Voted
IHI
2010
124views Healthcare» more  IHI 2010»
14 years 9 months ago
Reliable medical recommendation systems with patient privacy
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla