Sciweavers

1484 search results - page 277 / 297
» Security policies for downgrading
Sort
View
APCSAC
2001
IEEE
13 years 11 months ago
Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond
Since we first devised and defined password-capabilities as a new technique for building capability-based operating systems, a number of research systems around the world have use...
Ronald Pose
CCGRID
2001
IEEE
13 years 11 months ago
Replica Selection in the Globus Data Grid
The Globus Data Grid architecture provides a scalable infrastructure for the management of storage resources and data that are distributed across Grid environments. These services...
Sudharshan Vazhkudai, Steven Tuecke, Ian T. Foster
IIWAS
2008
13 years 8 months ago
Supporting mobile payment QOS by data mining GSM network traffic
In mobile commerce, short-message-service (SMS) is an important technique for delivering payment instruction. A payment model "SMS Credit" was proposed earlier [1]. Such...
Edison Lai, Simon Fong, Yang Hang
MIE
2008
194views Healthcare» more  MIE 2008»
13 years 8 months ago
Developing a Shared Electronic Health Record for Patients and Clinicians
Improving Shared Decision Making (SDM) and patient-provider communication, and providing all citizens with equal access to health information has become a high priority health poli...
Cornelia M. Ruland, Haakon Bryhni, Roar Andersen, ...
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
13 years 8 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...