Sciweavers

2429 search results - page 302 / 486
» Using Aspects to Design a Secure System
Sort
View
CBMS
2008
IEEE
15 years 9 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
CLEIEJ
1998
134views more  CLEIEJ 1998»
15 years 2 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
ENTCS
2006
140views more  ENTCS 2006»
15 years 3 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...
CCS
2006
ACM
15 years 6 months ago
TCG inside?: a note on TPM specification compliance
The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the secu...
Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St&...
EMSOFT
2008
Springer
15 years 4 months ago
Interface theories with component reuse
Interface theories have been proposed to support incremental design and independent implementability. Incremental design means that the compatibility checking of interfaces can pr...
Laurent Doyen, Thomas A. Henzinger, Barbara Jobstm...