Sciweavers

2335 search results - page 11 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
ACISP
2003
Springer
15 years 5 months ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
IMCS
2007
77views more  IMCS 2007»
14 years 11 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
WISTP
2007
Springer
15 years 5 months ago
An Information Flow Verifier for Small Embedded Systems
Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-...
PLDI
2005
ACM
15 years 5 months ago
TraceBack: first fault diagnosis by reconstruction of distributed control flow
Faults that occur in production systems are the most important faults to fix, but most production systems lack the debugging facilities present in development environments. TraceB...
Andrew Ayers, Richard Schooler, Chris Metcalf, Ana...
CSFW
2007
IEEE
15 years 3 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic