Sciweavers

2904 search results - page 354 / 581
» Internet Infrastructure Security
Sort
View
CBMS
2007
IEEE
15 years 10 months ago
Enabling the European Patient Summary through Triplespaces
One of the main items on the eHealth agenda of the European Community is the design and promotion of electronic patient summaries as an instrument to facilitate the pervasive deli...
Reto Krummenacher, Elena Paslaru Bontas Simperl, L...
HOLOMAS
2007
Springer
15 years 10 months ago
Detecting Intrusions in Agent System by Means of Exception Handling
We present a formal approach to conception of a dedicated security infrastructure based on the exception handling in the protected agents. Securityrelated exceptions are identifie...
Eric Platon, Martin Rehák, Nicolas Sabouret...
MCAM
2007
Springer
115views Multimedia» more  MCAM 2007»
15 years 10 months ago
Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring
By reviewing DRMs up to now and two typical examples – AVS DRM and DMP IDP, the paper tries to find out the fundamental challenge of content protection approach from technical an...
Tiejun Huang
HICSS
2006
IEEE
153views Biometrics» more  HICSS 2006»
15 years 10 months ago
IT Governance: Reviewing 17 IT Governance Tools and Analysing the Case of Novozymes A/S
Complexity in information technology architectures and infrastructures, and an increasing need for executives to verify and secure value generation processes in private as well as...
Michael Holm Larsen, Mogens Kühn Pedersen, Ki...
EGC
2005
Springer
15 years 10 months ago
Grid Access Middleware for Handheld Devices
Abstract. Grid technology attempts to support flexible, secure, coordinated information sharing among dynamic collections of individuals, institutions, and resources. The use of G...
Saad Liaquat Kiani, Maria Riaz, Sungyoung Lee, Tae...