Sciweavers

33 search results - page 5 / 7
» Enterprise privacy promises and enforcement
Sort
View
ISI
2008
Springer
13 years 5 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
IJMI
2007
140views more  IJMI 2007»
13 years 5 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
ACSAC
2001
IEEE
13 years 9 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
CCS
2008
ACM
13 years 7 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
IEEEARES
2006
IEEE
13 years 11 months ago
Making Web Services Dependable
Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services are dep...
Louise E. Moser, P. M. Melliar-Smith, Wenbing Zhao