Sciweavers

4413 search results - page 743 / 883
» Security for biometric data
Sort
View
CLADE
2008
IEEE
15 years 5 months ago
A grid-enabled workflow system for reservoir uncertainty analysis
Reservoir uncertainty analysis is significant for petroleum engineers for predictions of reservoir performance. However, analysis of reservoir performance uncertainty is challengi...
Emrah Ceyhan, Gabrielle Allen, Christopher D. Whit...
FM
2008
Springer
130views Formal Methods» more  FM 2008»
15 years 5 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
BCSHCI
2008
15 years 5 months ago
Ubiquitous healthcare: do we want it?
In this paper we describe the development and test of a futuristic health scenario that allows the seamless exchange of sensitive personal data. The scenario was used to elicit us...
Linda Little, Pamela Briggs
132
Voted
DBSEC
2010
152views Database» more  DBSEC 2010»
15 years 5 months ago
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
Hasan Qunoo, Mark Ryan
IWEC
2008
15 years 5 months ago
Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment
The ability to simulate a seaport environment, including illicit cargo and the sensors designed to detect such cargo, allows the evaluation of alternative detection methods in orde...
Allen Christiansen, Damian Johnson, Lawrence B. Ho...