Sciweavers

414 search results - page 6 / 83
» Secure Border Control Processes
Sort
View
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 4 months ago
Distributed Uplink Signal Processing of Cooperating Base Stations Based on IQ Sample Exchange
—Cellular systems in general suffer from co-channel interference, when simultaneous transmissions in other cells use the same physical resources. In order to mitigate such co-cha...
Christian Hoymann, Laetitia Falconetti, Rohit Gupt...
RTSS
2002
IEEE
15 years 2 months ago
STAR: Secure Real-Time Transaction Processing with Timeliness Guarantees
Real-time databases are needed in security-critical applications, e.g., e-commerce, agile manufacturing, and military applications. In these applications, transactions and data it...
Kyoung-Don Kang, Sang Hyuk Son, John A. Stankovic
AAAI
1996
14 years 11 months ago
The NASA Personnel Security Processing Expert System
The NASA Personnel Security Processing Expert System is a tool that automatically determines the appropriate personnel background investigation required for a civil servant or con...
David Silberberg, Robert Thomas
WEBI
2004
Springer
15 years 2 months ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen
90
Voted
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 1 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge