Sciweavers

1353 search results - page 52 / 271
» Securing Current and Future Process Control Systems
Sort
View
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
15 years 9 months ago
Replicating and Sharing Computer Security Laboratory Environments
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...
101
Voted
IROS
2006
IEEE
140views Robotics» more  IROS 2006»
15 years 8 months ago
Developing a non-intrusive biometric environment
— The development of large scale biometric systems requires experiments to be performed on large amounts of data. Existing capture systems are designed for fixed experiments and...
Lee Middleton, David K. Wagg, Alex I. Bazin, John ...
123
Voted
SAC
2008
ACM
15 years 2 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
119
Voted
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 6 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
144
Voted
BNCOD
2003
150views Database» more  BNCOD 2003»
15 years 4 months ago
Multilevel Secure Rules and Its Impact on the Design of Active Database Systems
The event-condition-action paradigm (also known as triggers or rules) gives a database “active” capabilities – the ability to react automatically to changes in the database o...
Indrakshi Ray