• No results found

[PDF] Top 20 Pravah: Parameterised Information Flow Control in e-Health

Has 10000 "Pravah: Parameterised Information Flow Control in e-Health" found on our website. Below are the top 20 most common "Pravah: Parameterised Information Flow Control in e-Health".

Pravah: Parameterised Information Flow Control in e-Health

Pravah: Parameterised Information Flow Control in e-Health

... for information related to that ...of information accessible to any ...of information from many (or all) ...the flow lattice and usually facilitate checking of permissible ...a ... See full document

17

Information Accountability with Policy Languages for e-Health

Information Accountability with Policy Languages for e-Health

... to control the flow and use of ...private information of individuals (Feigenbaum, Freedman et ...access control model but differs in that they require information to remain protected ... See full document

15

Managing Big Data with Information Flow Control

Managing Big Data with Information Flow Control

... Suppose a principal is allowed access to a subset of records, e.g. doctors may be able to access only the records of the patients they are currently treating. Temporally separated processes are likely, i.e. to deal with ... See full document

8

Implementation of the eHealth Project in Latvia: Project audit perspective

Implementation of the eHealth Project in Latvia: Project audit perspective

... infrastructure and skills, a narrow focus on one particular aspect of eHealth that disregards other concerns and impacts, and a lack of ownership by the health entities involved. The use of ICT in the general ... See full document

35

FlowR: Aspect Oriented Programming for Information Flow Control in Ruby

FlowR: Aspect Oriented Programming for Information Flow Control in Ruby

... In addition to this API we also support object methods manip- ulating their labels directly as this may be useful in some circum- stances. In Fig. 7 we illustrate how such direct manipulation can be used to prevent ... See full document

12

e-Health Literacy: An Essential Tool For Nigerian Retirees

e-Health Literacy: An Essential Tool For Nigerian Retirees

... of information literacy is still below average in ...many information literacy initiatives in ...sharing information or literacy project around the ...Libya, information literacy training in ... See full document

5

Everybody's talking at me: information flow in a command and control environment

Everybody's talking at me: information flow in a command and control environment

... the information events that the S3 initiated were spoken ...the information event where seeing an event came in second, the initiation side shows looking as ranking second ...side, information events ... See full document

132

Information System of Cash Flow Analysis for Determining Company’s Health

Information System of Cash Flow Analysis for Determining Company’s Health

... Cash Flow Analysis estimates help reduce earnings manipulation and improve earnings ...second flow of literature investigates the usefulness of information in Cash Flow Analysis estimates ... See full document

5

Joint rate control and scheduling for providing bounded delay with high efficiency in multihop wireless networks

Joint rate control and scheduling for providing bounded delay with high efficiency in multihop wireless networks

... A Multi-hop wireless network is composed of a cluster of wireless mobile nodes that form a network without a fixed infrastructure, using distributed control algo- rithms. A distinctive feature of such networks is ... See full document

123

Process dimensions and effectiveness of information systems planning: An empirical study on the implementation status of Chinese enterprises

Process dimensions and effectiveness of information systems planning: An empirical study on the implementation status of Chinese enterprises

... in information systems has increased ...strategies. Information systems planning has gained much attention in recent ...chief information officers (CIOs) of China (Yang, 2003, Li and Huang, ... See full document

11

Join rate control and scheduling for providing
bounded delay with high efficiency in multihop wireless networks

Join rate control and scheduling for providing bounded delay with high efficiency in multihop wireless networks

... This thesis addresses the problem of supporting delay-sensitive traffic with elastic data rate requirements and hard end-to-end delay constraints in multi-hop wireless networks, with source data transmission rates and ... See full document

124

Security in Cloud Computing Environment by Decentralized Information Flow Control

Security in Cloud Computing Environment by Decentralized Information Flow Control

... days. Information flow control (IFC) has been gaining acceptance as a better methodology for protecting privacy without unduly restricting access to sensitive ...data. Information flow ... See full document

6

How To Understand The Health Information Flow In The Cuba And South Africa

How To Understand The Health Information Flow In The Cuba And South Africa

... public health sector has implemented a flexible routine information system based on the MDS at all administrative levels, and these data sets, along with organizational structure, comprise the District ... See full document

53

Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model

Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model

... In this paper, we show that the model we pro- posed in [1] and [11] provides an applicable and efficient means to detect security policy violations in runtime. By controlling information flows on a host, we are ... See full document

10

A Simplified Rule Based Distributed Information Flow Control for Cloud Computing

A Simplified Rule Based Distributed Information Flow Control for Cloud Computing

... Description: Cloud is the shared medium where the user interacts with their data and applications at remote locations parallel with other users of the system. Now, with such a high interactions and heavily flowed traffic ... See full document

7

Workflow Based Information Flow Control(IFC) in Modern Operating Systems.

Workflow Based Information Flow Control(IFC) in Modern Operating Systems.

... Data sharing between user apps represents a primary security challenge for modern OSes. When one app shares data with another app, or writes data to storage accessible by other apps, it loses control of that data. ... See full document

72

Practical Fine-Grained Information Flow Control Using Laminar 1

Practical Fine-Grained Information Flow Control Using Laminar 1

... Decentralized Information Flow Control (DIFC) is a promising model for writing programs with powerful, 7 end-to-end security ...11 flow of information through fine-grained program data ... See full document

51

DYNAMIC JOINT SCHEDULING AND CONGESTION CONTROL IN WIRELESS NETWORKS

DYNAMIC JOINT SCHEDULING AND CONGESTION CONTROL IN WIRELESS NETWORKS

... to control the end-to-end delay of each ...congestion control algorithm based on the back pressure algorithm [16], [17], [19], ...congestion control is difficult to tune the throughput-delay ... See full document

7

A handbook prepared under contract for the Commission of the European Communities, Directorate-General for Energy by European Small Hydropower

A handbook prepared under contract for the Commission of the European Communities, Directorate-General for Energy by European Small Hydropower

... This handbook, an updated version of the original “Layman’s Handbook on how to develop a Small Hydro Site”, published by the Commission in 1993, has been written, in the frame of the ALTENER programme, under contract ... See full document

266

Integrating EHR and Predictive Modeling:

Integrating EHR and Predictive Modeling:

... the-art of Health Information Technology (HIT) and e- health tools used by private health care organizations and. public health agencies[r] ... See full document

31

Show all 10000 documents...