Sciweavers

5339 search results - page 300 / 1068
» Controllable Delay-Insensitive Processes
Sort
View
CSFW
1995
IEEE
15 years 8 months ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
ESORICS
2009
Springer
15 years 8 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...
FGCN
2008
IEEE
152views Communications» more  FGCN 2008»
15 years 6 months ago
Extending the UbiMDR Supporting Situation-Aware Access Control
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related...
Jeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik
172
Voted
ACSW
2007
15 years 6 months ago
Controlling Inference: Avoiding P-level Reduction during Analysis
This paper presents a concept hierarchy-based approach to privacy preserving data collection for data mining called the P-level model. The P-level model allows data providers to d...
Adepele Williams, Ken Barker
BIOSIG
2008
166views Biometrics» more  BIOSIG 2008»
15 years 6 months ago
Improving Border Control with 3D Face Recognition
: Biometric data have been integrated in all new European passports, since the member states of the European Commission started to implement the EU Council Regulation No 2252/2004 ...
Paul Welti, Jean-Marc Suchier, Christoph Busch