Sciweavers

94 search results - page 2 / 19
» A Regulated Approach to Certificate Management
Sort
View
CCGRID
2004
IEEE
13 years 9 months ago
A hardware-secured credential repository for Grid PKIs
Public Key Infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositorie...
Markus Lorch, Jim Basney, Dennis G. Kafura
DGO
2006
104views Education» more  DGO 2006»
13 years 6 months ago
Locating related regulations using a comparative analysis approach
The sheer volume and complexity of government regulations make any attempt to locate, understand and interpret the information a daunting task. Other factors, such as the scattere...
Gloria T. Lau, Haoyi Wang, Kincho H. Law
EMSOFT
2011
Springer
12 years 5 months ago
Software certification: coding, code, and coders
We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. T...
Klaus Havelund, Gerard J. Holzmann
IHI
2012
285views Healthcare» more  IHI 2012»
12 years 25 days ago
Towards HIPAA-compliant healthcare systems
In healthcare domain, there is a gap between healthcare systems and government regulations such as the Health Insurance Portability and Accountability Act (HIPAA). The violations ...
Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu
ENTCS
2008
130views more  ENTCS 2008»
13 years 5 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...