Filters








541,002 Hits in 3.8 sec

The design and implementation of a novel security model for HealthAgents

Liang Xiao, Srinandan Dasmahapatra, Paul Lewis, Bo Hu, Andrew Peet, Alex Gibb, David Dupplaw, Madalina Croitoru, Francesc Estanyol, Juan Martínez-Miranda, Horacio González-Vélez, Magílluch I Ariet
2011 Knowledge engineering review (Print)  
Nevertheless, the availability of the existing repository puts the basic user permissions in place and building a more advanced policy-based access control system on top of them for more specific control  ...  A security model for more advanced controllability The previous section describes a secure data sharing and collection service implemented in the system, where a user will either be able to access all  ... 
doi:10.1017/s0269888911000117 fatcat:jb2d5wabnraibngo2bpixrsrfy

Scalable machine learning framework for behavior-based access control

Jeffrey Cleveland, Michael Jay Mayhew, Aaron Adler, Michael Atighetchi
2013 2013 6th International Symposium on Resilient Control Systems (ISRCS)  
The Behavior-Based Access Control (BBAC) effort has been investigating means to increase resilience against these attacks.  ...  The scope of this paper is to describe the challenge of processing disparate cyber security information at scale, together with an architecture and work-in-progress prototype implementation for a cloud  ...  Second, current access control is based on static policies that tie crypto credentials to attributes that are used by access control rules.  ... 
doi:10.1109/isrcs.2013.6623773 fatcat:lgbb4jjglbhopbbm4ydjxxzewu

Development of a User Management Module for Internet TV Systems

Kangjai Lee, Jaegeol Yim
2015 International Journal of Multimedia and Ubiquitous Engineering  
Therefore, we develop a user management system for Internet TV systems. Our user management system controls accessing resources based on the roles of the user.  ...  For Internet TV systems, authorization is extremely important because Internet TV channels and videos should only be accessed by authorized users.  ...  One of the main features of our user management system is role-based access control.  ... 
doi:10.14257/ijmue.2015.10.11.05 fatcat:ntte4ryhnvffvletydv4xd3jwm

Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community [chapter]

V. Gorodetski, I. Kotenko, V. Skormin
2000 IFIP Advances in Information and Communication Technology  
In this paper, an integrated multi-agent approach to construction ofNetwork Security System (NSS) is considered.  ...  Emphasis is given to a description of the operation and learning mechanisms implemented in the security agents.  ...  The first function is implemented by means of performance of mandatory access control rules (ACR), and the second one-by discretionary ACR.  ... 
doi:10.1007/978-0-387-35515-3_30 fatcat:igvth4fhdbd25jbw6kpv62gziq

Security Implications of Distributed Database Management System Models [article]

C.Sunil Kumar, J.Seetha, S.R.Vinotha
2014 arXiv   pre-print
The most important of these factors are single and multilevel access controls (MAC), protection and integrity maintenance.  ...  While determining which distributed database replica will be more secure for a particular function, the choice should not be made exclusively on the basis of available security features.  ...  Acknowledgements The author would like to express their sincere gratitude to the Management of Dhanalakshmi College of Engineering, Chennai for their constant encouragement and co-operation.  ... 
arXiv:1401.7733v1 fatcat:sfskajpc2nc3fgynp7gksvjon4

Security Implications of Distributed Database Management System Models

Charupalli Sunil, J Seetha, S.R. Vinotha
2012 International Journal of Soft Computing and Software Engineering [JSCSE]  
The most important of these factors are single and multilevel access controls (MAC), protection and integrity maintenance.  ...  While determining which distributed database replica will be more secure for a particular function, the choice should not be made exclusively on the basis of available security features.  ...  Acknowledgements The author would like to express their sincere gratitude to the Management of Dhanalakshmi College of Engineering, Chennai for their constant encouragement and co-operation.  ... 
doi:10.7321/jscse.v2.n11.3 fatcat:4hsbm2k7nreyboucqeonkymigq

Developing a security protocol for a distributed decision support system in a healthcare environment

Liang Xiao, Paul Lewis, Alex Gibb
2008 Proceedings of the 13th international conference on Software engineering - ICSE '08  
usually raised from the distributed clinical settings.  ...  The result is the production of a secure and maintainable Multi-Agent System that enables secure communication, uniform home site authentication, and customised resource access authorisation.  ...  Figure 1 . 1 The distributed architecture of the HealthAgents system and its resource access flow control.  ... 
doi:10.1145/1368088.1368184 dblp:conf/icse/XiaoLG08 fatcat:5kzqmsnbofbz3mjjeohkyiaofy

Nebras Classifier

Seyyed Vahid Hashemian, Sasan Dashtinezhad, Navid Khosravi
2002 Companion of the 17th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications - OOPSLA '02  
Nebras Classifier is a distributed model-view component developed to perform one type of information handling -namely classification-using both COM and CORBA communication facilities.  ...  The view is a graphical representation for this model.  ...  Therefore some policies are necessary for change propagation and access control among classifiers, such as developing new components playing the role of manager for change propagation and access control  ... 
doi:10.1145/985072.985088 dblp:conf/oopsla/HashemianDK02 fatcat:je6cqi24zjcbvmf6q22mosmchq

An FPGA-based architecture for embedded systems performance acceleration applied to Optimum-Path Forest classifier

Wendell F.S. Diniz, Vincent Fremont, Isabelle Fantoni, Eurípedes G.O. Nóbrega
2017 Microprocessors and microsystems  
out in the framework of the Labex MS2T, funded by the French Government through the program "Investments for the future" managed by the National Agency for Research (Reference ANR-11-IDEX-0004-02).  ...  Acknowledgment This work is supported by the PDSE program of Coordination for Improvement of High Education Personnel (CAPES) of Brazilian Ministry of Education, process 680 nº13077/2013-09 and carried  ...  Memory access is 32 505 bit-aligned, using the shared memory controller on the HP, which implements a direct interface between the FPGA fabric and the Hard Processor System (HPS) DDR controller, which  ... 
doi:10.1016/j.micpro.2017.06.013 fatcat:sp3p5ai2ovdv7awrslnbswe2te

Implementing distributed internet security using a firewall collaboration framework

J. Thames, Randal Abler
2007 Proceedings 2007 IEEE SoutheastCon  
Society has grown to rely on Internet services, and the number of Internet users increases every day.  ...  In order to enhance the capabilities of computer network security devices such as firewalls, the Distributed Network  ...  Packet filters rely on access control lists based on packet types and local security policies, i.e. allowing users access to the world wide web.  ... 
doi:10.1109/secon.2007.342987 fatcat:o7aww33ecne6pbsvg2ov22rkym

Analysis and Development of Information Security Framework for Distributed E-Procurement System

Sugianto Sugianto
2019 Proceeding of the Electrical Engineering Computer Science and Informatics  
This paper proposes an information security framework for distributed E-Procurement system in Indonesia. E-Procurement in Indonesia has been implemented since 2008, and has provided many benefits.  ...  By implementing the proposed framework, LPSE as a provider of distributed E-Procurement system can be easier to implement the LPSE and ISO 27001 Standards simultaneously as an obligation to comply with  ...  This research focuses on analysis and development a framework of information security for LPSE as a provider of distributed E-Procurement system.  ... 
doi:10.11591/eecsi.v6.1989 fatcat:xy4z3dvukfbqrdvfo4y5nbrggy

A Parallel and Memory-Efficient Mean Shift Filter on a Regular Graph

Sungchan Park, Youngmin Ha, Hong Jeong
2007 The 2007 International Conference on Intelligent Pervasive Computing (IPC 2007)  
Current research in distributed systems focuses on object group models which are designed for scalable systems and provide accessible objects to the entire group.  ...  This paper proposes a locator service for the framework which implements the intelligent search mechanism based on neuro-fuzzy system.  ...  Introduction Implementation of services based on Common Object Request Broker Architecture (CORBA) is popular design for robust systems in distributed environment [1, 2] .  ... 
doi:10.1109/ipc.2007.71 dblp:conf/ipc/ParkHJ07 fatcat:5ug34xd4jna77ftq44fnh7i5qq

Application on Pervasive Computing in Healthcare – A Review

Paramita Sarkar, Ditipriya Sinha
2017 Indian Journal of Science and Technology  
Such systems provide support to remote patients and to disaster affected people.  ...  Background/Objectives: Application of pervasive computation in healthcare is an interdisciplinary research domain for both the medical and computer domains.  ...  For sharing of patients' health information in pervasive healthcare systems we need access control schemes to fetch and implement the specific needs of each patient.  ... 
doi:10.17485/ijst/2017/v10i3/110619 fatcat:cciamdk3hvebdlvb7ir6xqcy6m

Guest Editorial: Intelligent Distributed Computing

Igor V. Kotenko
2020 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
The authors present a Wi-Fi access scenario, in which the service provider has to implement access control decisions before the person is authenticated through the eIDAS Network.  ...  The approach is based on distributed data processing mechanisms, including mobile phones, a server and separate modules for doctors.  ...  The authors present a Wi-Fi access scenario, in which the service provider has to implement access control decisions before the person is authenticated through the eIDAS Network.  ... 
doi:10.22667/jowua.2020.06.30.001 dblp:journals/jowua/Kotenko20 fatcat:yar26oy4xvgkvfeeje7ja7mt2y

A Security Model and its Application to a Distributed Decision Support System for Healthcare

Liang Xiao, Javier Vicente, Carlos S, Andrew Peet, Alex Gibb, Paul Lewis, Srinandan Dasmahapatra, Madalina Croitoru, Horacio Gonz, Mag Ariet, David Dupplaw
2008 2008 Third International Conference on Availability, Reliability and Security  
We present in this paper a link-anonymised data scheme and in addition to that, a security model that together enforce privacy data security and secure resource access for distributed clinical centres.  ...  A distributed decision support system involving multiple clinical centres is crucial to the diagnosis of rare diseases.  ...  A third approach introduces a central access control (CAC) system and multiple local access control (LAC) systems [13] to the similar distributed record exchange problem.  ... 
doi:10.1109/ares.2008.22 dblp:conf/IEEEares/XiaoVSPGLDCGAD08 fatcat:dzqsc36cefhbplskdolhxaqd7e
« Previous Showing results 1 — 15 out of 541,002 results