Sciweavers

83 search results - page 12 / 17
» Model-based assurance of security controls
Sort
View
CBMS
2008
IEEE
15 years 4 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
NTMS
2009
IEEE
15 years 5 months ago
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework
—IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one ...
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fra...
CCS
2008
ACM
15 years 11 days ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
OOPSLA
2005
Springer
15 years 3 months ago
AutAT: an eclipse plugin for automatic acceptance testing of web applications
In this paper we describe AutAT, an open source Eclipse plugin to better enable test driven development of web applications. AutAT lets non-technical people write acceptance tests...
Christian Schwarz, Stein Kåre Skytteren, Tro...
IJNSEC
2006
88views more  IJNSEC 2006»
14 years 10 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang