Sciweavers

1795 search results - page 281 / 359
» Security Models and Information Flow
Sort
View
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 3 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
OOPSLA
2005
Springer
14 years 2 months ago
Improving architecture testability with patterns
There is a critical need for approaches to support software testing. Our research exploits the information described at Architectural Patterns to drive the definition of tests. As...
Roberta Coelho, Uirá Kulesza, Arndt von Sta...
AINA
2009
IEEE
14 years 2 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
JODS
2007
138views Data Mining» more  JODS 2007»
13 years 9 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
IHI
2012
266views Healthcare» more  IHI 2012»
12 years 4 months ago
A software tool for large-scale sharing and querying of clinical documents modeled using HL7 version 3 standard
We present a novel software tool called CDN (Collaborative Data Network) for large-scale sharing and querying of clinical documents modeled using HL7 v3 standard (e.g., Clinical D...
Praveen R. Rao, Tivakar Komara Swami, Deepthi S. R...