Sciweavers

1117 search results - page 115 / 224
» A Compliance Model of Trust
Sort
View
IPAW
2010
14 years 12 months ago
Provenance of Decisions in Emergency Response Environments
Mitigating the devastating ramifications of major disasters requires emergency workers to respond in a maximally efficient way. Information systems can improve their efficiency by ...
Iman Naja, Luc Moreau, Alex Rogers
SERVICES
2010
201views more  SERVICES 2010»
14 years 8 months ago
IT Auditing to Assure a Secure Cloud Computing
In this paper we discuss the evolvement of cloud computing paradigm and present a framework for secure cloud computing through IT auditing. Our approach is to establish a general ...
Zhixiong Chen, John Yoon
CRYPTO
2007
Springer
110views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Cryptography in the Multi-string Model
The common random string model introduced by Blum, Feldman and Micali permits the construction of cryptographic protocols that are provably impossible to realize in the standard m...
Jens Groth, Rafail Ostrovsky
WSC
2007
15 years 4 months ago
A supply chain paradigm to model business pprocesses at the Y-12 National Security Complex
The NNSA’s Y-12 National Security Complex is a manufacturing facility operated by BWXT Y-12. Y-12’s missions include ensuring the US’ nuclear weapons deterrent, storing nucl...
Reid L. Kress, Jack Dixon, Thomas M. Insalaco, Ric...
ADC
2009
Springer
175views Database» more  ADC 2009»
15 years 8 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang