Sciweavers

3544 search results - page 601 / 709
» Information Security in Open Systems
Sort
View
SIGUCCS
2005
ACM
15 years 4 months ago
Universal imaging: revolutionizing desktop support
Lehigh University has recently implemented a new PC deployment model which is built around the Universal Imaging Utility, a product of Big Bang, LLC. This model has allowed Lehigh...
Stephen G. Lewis, Sara K. Rodgers
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 4 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
94
Voted
ICWS
2008
IEEE
15 years 17 days ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
61
Voted
ECIS
2004
15 years 15 days ago
Evaluating integration approaches benefits adopted by healthcare organisations
Healthcare organizations consist of a large number of disparate information systems (IS). These have been deployed to support specific needs of healthcare organisations. The infor...
Khalil Khoumbati, Marinos Themistocleous, Zahir Ir...
IPMU
2010
Springer
14 years 9 months ago
See-Through Vision: A Visual Augmentation Method for Sensing-Web
Abstract. Many surveillance cameras are being installed throughout the environments of our daily lives because they effectively maintain safety and offer security to ordinary peopl...
Yuichi Ohta, Yoshinari Kameda, Itaru Kitahara, Mas...