Sciweavers

244 search results - page 29 / 49
» Dynamic Dependency Monitoring to Secure Information Flow
Sort
View
CCS
2006
ACM
15 years 1 months ago
Securing the drop-box architecture for assisted living
Home medical devices enable individuals to monitor some of their own health information without the need for visits by nurses or trips to medical facilities. This enables more con...
Michael J. May, Wook Shin, Carl A. Gunter, Insup L...
CAISE
2010
Springer
14 years 9 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
ANOR
2005
102views more  ANOR 2005»
14 years 9 months ago
Locating Active Sensors on Traffic Networks
Sensors are used to monitor traffic in networks. For example, in transportation networks, they may be used to measure traffic volumes on given arcs and paths of the network. This p...
Monica Gentili, Pitu B. Mirchandani
KES
2004
Springer
15 years 3 months ago
Detection of Dynamical Transitions in Biomedical Signals Using Nonlinear Methods
The ability to detect the existence of nonlinear dynamics may facilitate medical diagnostics for identifying, monitoring and predicting transitions from health to sickness. Detecti...
Patrick E. McSharry
ESORICS
2008
Springer
14 years 11 months ago
Termination-Insensitive Noninterference Leaks More Than Just a Bit
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of informa...
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, D...