Sciweavers

1167 search results - page 204 / 234
» policy 2007
Sort
View
ACISP
2007
Springer
14 years 2 months ago
A New Strategy for Finding a Differential Path of SHA-1
In this paper, we propose a new construction algorithm for finding differential paths of Round 1 of SHA-1 for use in the collision search attack. Generally, the differential path o...
Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwa...
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
14 years 2 months ago
The impact of technology on the quality of information
When new technologies for production and dissemination of information emerge and are adopted, we see a dramatic increase in the quantity of information that is made available for ...
Aditi Mukherjee, Jungpil Hahn
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
14 years 2 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
BPM
2007
Springer
258views Business» more  BPM 2007»
14 years 2 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
CEC
2007
IEEE
14 years 2 months ago
Adaptive farming strategies for dynamic economic environment
This paper aims to forecast the economic impacts of changing land-use in UK uplands. We assume that farmers adaptively learn and respond to a dynamic economic environment. The main...
Nanlin Jin, Mette Termansen, Klaus Hubacek, Joseph...