Sciweavers

438 search results - page 48 / 88
» Activity-based Access Control Model to Hospital Information
Sort
View
IEEEARES
2008
IEEE
15 years 4 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
EDOC
2005
IEEE
15 years 3 months ago
Bridging the Gap between Data Warehouses and Business Processes: A Business Intelligence Perspective for Event-Driven Process Ch
Data Warehouse (DWH) information is accessed by business processes, and sometimes may also initiate changes of the control flow of business process instances. Today, there are no ...
Veronika Stefanov, Beate List
HICSS
2003
IEEE
144views Biometrics» more  HICSS 2003»
15 years 3 months ago
Democracy Functions of Information Technology
Information Technology, IT, may play an important part in any community as a supporting tool in the democratic process. The conditions for that to happen are primarily a genuine w...
Gunnar Lidén, Anders Avdic
WOWMOM
2000
ACM
96views Multimedia» more  WOWMOM 2000»
15 years 2 months ago
An integrated mobility and traffic model for resource allocation in wireless networks
In a wireless communications network, the movement of mobile users presents significant technical challenges to providing efficient access to the wired broadband network. In this ...
Hisashi Kobayashi, Shun-Zheng Yu, Brian L. Mark
CORR
2008
Springer
143views Education» more  CORR 2008»
14 years 10 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani