Sciweavers

3544 search results - page 70 / 709
» Information Security in Open Systems
Sort
View
IEEEIAS
2009
IEEE
15 years 5 months ago
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression
: Threats to information security for healthcare information system increased tremendously. There are various factors that contribute to information security threats, many research...
Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilw...
SACMAT
2006
ACM
15 years 5 months ago
Information flow property preserving transformation of UML interaction diagrams
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
Fredrik Seehusen, Ketil Stølen
P2P
2008
IEEE
149views Communications» more  P2P 2008»
15 years 5 months ago
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems
In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access ...
Brent Lagesse, Mohan Kumar, Matthew Wright
HT
2009
ACM
15 years 5 months ago
Cross-tagging for personalized open social networking
The Social Web is successfully established and poised for continued growth. Web 2.0 applications such as blogs, bookmarking, music, photo and video sharing systems are among the m...
Avare Stewart, Ernesto Diaz-Aviles, Wolfgang Nejdl...
FOSSACS
2010
Springer
15 years 5 months ago
The Complexity of Synchronous Notions of Information Flow Security
The paper considers the complexity of verifying that a finite state system satisfies a number of definitions of information flow security. The systems model considered is one i...
Franck Cassez, Ron van der Meyden, Chenyi Zhang