Sciweavers

1407 search results - page 24 / 282
» Systems Theory Model for Information Security
Sort
View
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
14 years 1 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
HICSS
2007
IEEE
139views Biometrics» more  HICSS 2007»
14 years 2 months ago
Physicians' Resistance toward Healthcare Information Technologies: A Dual-Factor Model
This paper proposes and validates a theory of physician resistance toward IT usage by drawing on prior research in the resistance to change literature and a recent dual-factor mod...
Anol Bhattacherjee, Neset Hikmet
SIMULATION
1998
83views more  SIMULATION 1998»
13 years 7 months ago
Libraries of Reusable Models: Theory and Application
Setting up a simulation model is more than writing down state equations and running them on a computer. A lot of conceptual information about the physics and engineering aspects o...
Arno Breunese, Jan L. Top, Jan F. Broenink, J. M. ...
EUROCRYPT
2012
Springer
11 years 10 months ago
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
Tatsuaki Okamoto, Katsuyuki Takashima
CSFW
2000
IEEE
14 years 10 days ago
Information Flow Analysis in a Discrete-Time Process Algebra
Some of the non interference properties studied in [4, 6, 18] for information flow analysis in computer systems, notably Æ , are reformulated here in a realtime setting. This is...
Riccardo Focardi, Roberto Gorrieri, Fabio Martinel...