Sciweavers

948 search results - page 64 / 190
» Analysis of SITA policies
Sort
View
JCS
2010
124views more  JCS 2010»
15 years 11 days ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
IIS
2001
15 years 3 months ago
Intelligent Techniques in Stock Analysis
The paper presents computer system, named Stock Market Electronic Expert (SMEE), for Stock Market Analysis. It is developed as friendly, useful and credible computer program giving...
Halina Kwasnicka, Marcin Ciosmak
JDCTA
2010
111views more  JDCTA 2010»
14 years 8 months ago
Internet as a "point of synergy" between communication and distribution: hypothesis of model applied to tourism
The wide diffusion of new technologies in communication and business has changed how consumer and product/store knowledge has to be managed and represented digitally. This issue h...
Pierpaolo Singer, Maria Antonella Ferri, Lucia Aie...
IHI
2012
285views Healthcare» more  IHI 2012»
13 years 9 months ago
Towards HIPAA-compliant healthcare systems
In healthcare domain, there is a gap between healthcare systems and government regulations such as the Health Insurance Portability and Accountability Act (HIPAA). The violations ...
Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu
PLDI
2012
ACM
13 years 4 months ago
RockSalt: better, faster, stronger SFI for the x86
Software-based fault isolation (SFI), as used in Google’s Native Client (NaCl), relies upon a conceptually simple machine-code analysis to enforce a security policy. But for com...
Greg Morrisett, Gang Tan, Joseph Tassarotti, Jean-...