Filters








888,147 Hits in 5.4 sec

The transfer of information and authority in a protection system

Matt Bishop, Lawrence Snyder
1979 Proceedings of the seventh symposium on Operating systems principles - SOSP '79  
the information (usually in the form of a copy and with the assistance of others), without necessarily being able to get the direct authority to read the information.  ...  In the context of a capability-based protection system, the term "transfer" is used (here) to refer to the situation where a user receives information when he does not initially have a direct "right" to  ...  Fabry, A. K. Jones and W. L. Ruzzo. We must thank W. L. Ruzzo and the referees for important technical suggestions, and MicheleBoucher for her patience and expert typing of the document.  ... 
doi:10.1145/800215.806569 dblp:conf/sosp/BishopS79 fatcat:cjtbvq552zbf7dqi3s5llkc3be

Protection of patient data in multi-institutional medical computer networks: regulatory effectiveness analysis

V M Brannigan
1993 Proceedings. Symposium on Computer Applications in Medical Care  
Privacy protection is one of the major issues in the development of multi-institutional clinical information networks.  ...  The medical profession had substantial input into the privacy protection features of the NPDB, which are much more comprehensive than those used in many clinical information systems.  ...  INTRODUCTION Patient privacy is a major consideration in the development of medical information systems.  ... 
pmid:8130542 pmcid:PMC2248476 fatcat:gzp4u3ujinaz3cnop2zkjh4yxq

THE USE OF A PATENT BY CO-AUTH ORS AND HEIRS FOR COMMERCIAL PURPOSES AND SOME ISSUES OF PUBLICITY IN PROCEEDINGS RELATED TO DISPUTES OVER INTELLECTUAL RIGHT PROTECTION
Использование патента соавторами и наследниками в коммерческих целях и некоторые вопросы гласности в судопроизводстве по спорам о защите интеллектуальных прав

Tatyana V. Ivanova, Еmployee of Servisavtomatika Limited Liability Company
2020 Law of succession  
The article considers certain situations that arise while using a patent for an invention by co-authors and successors and some issues of publicity in legal disputes over the protection of intellectual  ...  The publicity of information in a legal case is most likely to provide the opportunity to satisfy a claim for the protection of intellectual property right.  ...  The article considers certain situations that arise while using a patent for an invention by co-authors and successors and some issues of publicity in legal disputes over the protection of intellectual  ... 
doi:10.18572/2072-4179-2020-3-24-27 fatcat:gm5cz3s6pndgfod7cqps2gblay

A Content Creation and Protection Scheme for Medical Images [article]

Chen-Yu Lee, Deng-Jyi Chen
2015 arXiv   pre-print
Image feature descriptions are often captured only as free text stored in the image file or in the hospital information system.  ...  Medical images contain metadata information on where, when, and how an image was acquired, and the majority of this information is stored as pixel data.  ...  A Partial DRM System with DICOM Compatibility for Medical Record Transfer The concept of partial DRM Here we propose a partial DRM approach for DICOM information protection.  ... 
arXiv:1504.03385v1 fatcat:dptbfvc7cjaathlm2vn73rpxey

Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case [chapter]

Svetlana Sapelova, Borka Jerman-Blažič
2014 IFIP Advances in Information and Communication Technology  
Clearly inform the user about the purpose of the data transfer and the name of the data receiver. 4.  ...  system are reviewed in Chapter 3, architecture of the Pan-European IdMs is presented in Chapter 4, and the privacy analysis of the system is in Chapter 5.  ... 
doi:10.1007/978-3-642-55137-6_17 fatcat:jffqtnj2ffeg3dfeyp35wnjvnq

Algorithm of ensuring confidential data security of the cloud medical information system

L Babenko, A Shumilin, D Alekseev, V. Breskich, A. Zheltenkov, Y. Dreizis
2020 E3S Web of Conferences  
The objectives of the study are to develop and assess the effectiveness of the structure of a cloud platform for storing, processing and organizing medical data, determining a method of protection, in  ...  The proposed method for protecting a medical information system involves the use of an original DICOM file and subsequently a converted PNG image, which is subjected to a pixel encryption algorithm.  ...  Acknowledgements This work was supported by the RFBR grant No. 20-37-90138 Postgraduates.  ... 
doi:10.1051/e3sconf/202022403023 fatcat:kmiid2y6c5h3db6qg5hb57ibbi

Research on digital copyright protection based on the hyperledger fabric blockchain network technology

Yanhui Liu, Jianbiao Zhang, Shupei Wu, Muhammad Salman Pathan
2021 PeerJ Computer Science  
The test results show that the proposed system provides effective protection of the digital copyright system and can efficiently confirm the rights of digital copyright.  ...  Many digital copyright protection techniques were developed in the past, but still, there are many loopholes in the protection systems to be covered.  ...  Sarah Maroc, who got her doctor's degree from Beijing University of Technology last year. She provided great help during the preparation of the manuscript.  ... 
doi:10.7717/peerj-cs.709 pmid:34616889 pmcid:PMC8459789 fatcat:ndjl2tkeojduzm6sir6pt2sqei

Security of accounting records in the units of a municipal government

Anna ĆWIĄKAŁA-MAŁYS, The University of Wrocław, Małgorzata DURBAJŁO-MROWIEC, The University of Wrocław
2020 Scientific Papers of Silesian University of Technology. Organization and Management Series  
Purpose: The aim of this publication is to diagnose if and to what extent the changes in personal data security were transferred to security of information/ data in terms of accountancy in the units of  ...  Originality/value: The information security system in accounting was assessed, the area omitted in publications and practice.  ...  -the server and the computer are protected by anti- virus software, -the head of the unit decides who is authorized to access the system x -a system of ID is in place, -authorizing passwords  ... 
doi:10.29119/1641-3466.2020.145.5 fatcat:lyhzywzo75aa7aa263jp33qgr4

Hierarchical Take-Grant Protection systems

Matt Bishop
1981 Proceedings of the eighth symposium on Operating systems principles - SOSP '81  
But little has been said about the transfer of information. The two types of transfers are distinct, and the transfer of information, in addition to the transfer of authority, will be discussed here.  ...  Briefly, in the model of hierarchical protection systems developed here, we are concerned with preventing transfers of information to subjects with a lower security level than the information has, as well  ...  These rules are the rewriting rules for transfers of authority and information, respectively.  ... 
doi:10.1145/800216.806598 dblp:conf/sosp/Bishop81 fatcat:ujfak6ekpbgv3il3kf42d5fq7a

Hierarchical Take-Grant Protection systems

Matt Bishop
1981 ACM SIGOPS Operating Systems Review  
But little has been said about the transfer of information. The two types of transfers are distinct, and the transfer of information, in addition to the transfer of authority, will be discussed here.  ...  Briefly, in the model of hierarchical protection systems developed here, we are concerned with preventing transfers of information to subjects with a lower security level than the information has, as well  ...  These rules are the rewriting rules for transfers of authority and information, respectively.  ... 
doi:10.1145/1067627.806598 fatcat:soacd4ifdnamzhe6s2n55zbjke

Japan's Personal Information Protection Policy Under Pressure

Yuko Suda
2020 Asian Survey  
In sum, the latest changes in Japanese personal information protection regulation paved the way for the Japan-EU data transfer agreement; these changes were precipitated by the extraterritorial effect  ...  This article explores the politics surrounding the recent data transfer agreement between Japan and the European Union, with a focus on the linkage between Japanese domestic politics and foreign pressure  ...  the case in which the foreign country in question has a "personal information protection system recognized to have equivalent standards to that in Japan in regard to the protection of an individual's  ... 
doi:10.1525/as.2020.60.3.510 fatcat:bvoqrgvkobfjxa6azlkqe2a35q

Information Sharing in the Dublin System: Remedies for Asylum Seekers In-Between Gaps in Judicial Protection and Interstate Trust

Niovi Vavoula
2021 German Law Journal  
This Article examines whether the Dublin system ensures effective judicial and administrative remedies in the operationalization of multijurisdictional information networks.  ...  In addition to rules in the Regulation itself—Article 34—information sharing also takes place through Eurodac, an EU-wide centralized information system.  ...  authorities participating in Eurodac are granted direct information access to stored data for all participating authorities, the system establishes a high level of information integration and constitutes  ... 
doi:10.1017/glj.2021.11 fatcat:j2e6jyu3frcn7eg27e55fuak44

Thoughts on the Right Transfer Issues of Farming Land

Furong Song, Lifeng Dong
2009 Journal of geography and geology  
, a system lack of proper mechanism and regulation.  ...  Farming right transfer of land is an inevitable consequence of the economic development in agriculture.  ...  Grow aggressively the intermediary organization for the land transfer Establishing a market for transfer the right of using land is imperative in the shift of land transfer system.  ... 
doi:10.5539/jgg.v1n1p38 fatcat:cb5edfs5cvg4dkjf52rtbhnwie

ABYSS: an architecture for software protection

S.R. White, L. Comerford
1990 IEEE Transactions on Software Engineering  
Software may be transferred between systems, and backed up to guard against loss in case of failure.  ...  The use of ABYSS discussed in this paper is oriented towards solving the software protection problem, especially in the lower end of the market.  ...  ACKNOWLEDGMENT The authors greatly appreciate the contributions of the ABYSS group, W. C. Arnold, T. J. Nolan, B. Strohm, and S . H.  ... 
doi:10.1109/32.55090 fatcat:pk5xl4kwjzctljy2qpjyvey6bq

Ict Security Of A State

Mirosław Smolarek, Marek Witkowski
2015 International conference KNOWLEDGE-BASED ORGANIZATION  
The paper presents the impact of the reliable ICT systems on efficient and safe functioning of a state. Moreover risks which faced communication and information systems have been presented.  ...  Then they indicated ICT systems that can be used for providing continuous and flawless exchange of information, with particular emphasis on the need of protection of information from unauthorized access  ...  Conclusions The use of information protection measures in ICT systems should guarantee confidentiality, integrity and continuous availability and access to stored data only by authorized persons.  ... 
doi:10.1515/kbo-2015-0125 fatcat:xkykmkds3jbgrbtimqxekd557e
« Previous Showing results 1 — 15 out of 888,147 results