Sciweavers

80 search results - page 6 / 16
» A Policy Architecture for Enhancing and Controlling Features
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
Covert and Side Channels Due to Processor Architecture
Information leakage through covert channels and side channels is becoming a serious problem, especially when these are enhanced by modern processor architecture features. We show ...
Zhenghong Wang, Ruby B. Lee
ICWS
2003
IEEE
15 years 29 days ago
Access Control in Dynamic XML-Based Web-Services with X-RBAC
Policy specification for securing Web services is fast emerging as a key research area due to rapid proliferation of Web services in modern day enterprise applications. Whilst the...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
CNIS
2006
15 years 1 months ago
STRBAC - An approach towards spatio-temporal role-based access control
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government organizations has led to considerable research in time- and location-b...
Mahendra Kumar, Richard E. Newman
GECCO
2005
Springer
118views Optimization» more  GECCO 2005»
15 years 5 months ago
The Push3 execution stack and the evolution of control
The Push programming language was developed for use in genetic and evolutionary computation systems, as the representation within which evolving programs are expressed. It has bee...
Lee Spector, Jon Klein, Maarten Keijzer
IHI
2012
353views Healthcare» more  IHI 2012»
13 years 7 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad