Sciweavers

1401 search results - page 37 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
IWIA
2005
IEEE
15 years 4 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
AIME
2011
Springer
13 years 11 months ago
A Constraint Logic Programming Approach to Identifying Inconsistencies in Clinical Practice Guidelines for Patients with Comorbi
This paper describes a novel methodological approach to identifying inconsistencies when concurrently using multiple clinical practice guidelines. We discuss how to construct a for...
Martin Michalowski, Marisela Mainegra Hing, Szymon...
72
Voted
WSC
1997
15 years 13 days ago
Simulation of the Queston Physician Network
This paper examines the construction and implementation of a simulation model that supports the design and development of the Queston Physician Network. Queston seeks to partner w...
James R. Swisher, J. Brian Jun, Sheldon H. Jacobso...
91
Voted
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
15 years 11 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
EMSOFT
2004
Springer
15 years 4 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter