Sciweavers

3544 search results - page 26 / 709
» Information Security in Open Systems
Sort
View
ACSAC
2001
IEEE
15 years 2 months ago
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...
Bernd Blobel
EMNLP
2011
13 years 10 months ago
Identifying Relations for Open Information Extraction
Open Information Extraction (IE) is the task of extracting assertions from massive corpora without requiring a pre-specified vocabulary. This paper shows that the output of state...
Anthony Fader, Stephen Soderland, Oren Etzioni
CASSIS
2005
Springer
15 years 4 months ago
Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks
Abstract. We study secure information flow in a stack based Typed Assembly Language (TAL). We define a TAL with an execution stack and establish the soundness of its type system ...
Eduardo Bonelli, Adriana B. Compagnoni, Ricardo Me...
ICCS
2001
Springer
15 years 3 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
SOUPS
2009
ACM
15 years 5 months ago
Serial hook-ups: a comparative usability study of secure device pairing methods
Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless ...
Alfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin ...