Sciweavers

2421 search results - page 166 / 485
» Consistency Management for Complex Applications
Sort
View
USENIX
1994
15 years 6 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
BMCBI
2005
93views more  BMCBI 2005»
15 years 4 months ago
Identification of novel prognostic markers in cervical intraepithelial neoplasia using LDMAS (LOH Data Management and Analysis S
Background: Detection of Loss of Heterozygosity (LOH) is one of the most common molecular applications in the study of human diseases, in particular cancer. The technique is commo...
Rifat A. Hamoudi, Amina El-Hamidi, Ming-Qing Du
ICEIS
2000
IEEE
15 years 9 months ago
A Holistic Information Systems Strategy for Organisational Management-HISSOM
Alignment of organisational strategy with Information Systems Strategy (ISS) has become critical as adoption of Information Systems (IS) over the last 50 years has escalated. IS c...
David Lanc, Lachlan M. MacKinnon
CSFW
2004
IEEE
15 years 8 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
GI
2009
Springer
15 years 2 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...