Sciweavers

3605 search results - page 147 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
IHI
2010
197views Healthcare» more  IHI 2010»
13 years 3 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
SAC
2009
ACM
14 years 24 days ago
Towards developing a trust-based security solution
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small...
Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Shari...
CCS
2010
ACM
13 years 7 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
IAT
2009
IEEE
13 years 11 months ago
Developing a Deterministic Patrolling Strategy for Security Agents
Abstract—Developing autonomous systems that patrol environments for detecting intruders is a topic of increasing relevance in security applications. An important aspect of these ...
Nicola Basilico, Nicola Gatti, Francesco Amigoni
CNSR
2005
IEEE
210views Communications» more  CNSR 2005»
13 years 10 months ago
A Framework for Self-Management of Hybrid Wireless Networks Using Autonomic Computing Principles
The dramatic increase in the number of mobile subscribers has put a significant resource and service provisioning strain on current cellular networks in particular in terms of mu...
Chong Shen, Dirk Pesch, James Irvine