Sciweavers

438 search results - page 46 / 88
» Activity-based Access Control Model to Hospital Information
Sort
View
DBSEC
2006
160views Database» more  DBSEC 2006»
14 years 11 months ago
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation
Abstract. Controlled Query Evaluation (CQE) offers a logical framework to prevent a user of a database from inadvertently gaining knowledge he is not allowed to know. By modeling t...
Joachim Biskup, Lena Wiese
WICOMM
2011
14 years 4 months ago
The effects of shadow-fading on QoS-aware routing and admission control protocols designed for multi-hop MANETs
—Providing quality-of-service (QoS) assurances in a mobile ad hoc network (MANET) is difficult due to node mobility, contention for channel access, a lack of centralised coordin...
Lajos Hanzo, Rahim Tafazolli
APWEB
2011
Springer
14 years 1 months ago
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems
Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use; on the other hand, usable i...
Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, ...
SACMAT
2003
ACM
15 years 3 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
CMOT
2010
176views more  CMOT 2010»
14 years 7 months ago
A cognitive model of spatial path-planning
Planning a path to a destination, given a number of options and obstacles, is a common task. We suggest a two-component cognitive model that combines retrieval of knowledge about t...
David Reitter, Christian Lebiere