-
Private
and Trusted Interactions From Department of Computer
Sciences, CERIAS and CWSA, Purdue University
-
Trust-Based
Security Protocols From University of Arkansas
-
Assessing the Effect of Deceptive Data in the Web of Trust
From University of Arkansas
-
Data access control and measure in the development of web-based
health insurance systems From Computer Science Department,
Information Assurance Center, West Chester University
-
A Policy-Based Security Mechanism for Distributed Health
Networks From netlab Research Group, Dept of Computer
Science, University of Victoria
-
Securing
Clinical Knowledge, Balancing Accessibility, Security, and
Privacy in Dental Education From Daniel W. Emmer, PhD
Ebrahim Randeree, MBA
-
Securing Pervasive Networks Using Biometrics From Center for
Unified Biometrics and Sensors, University at Buffalo
-
Using Facets of Security within a Knowledge-based Framework to
Broker and Manage Semantic Web Services From E-Center for
E-Business, George Mason University
-
Securing Content in the Department of Defense’s Global
Information Grid By Robert W. McGraw, Technical Director, IA
Architecture & Systems Security Engineering Group, Information
Assurance Directorate, National Security Agency
-
Enhanced Access Control for Collaborative Documents By
Jeffrey D. Campbell Interactive Systems Research Center,
Information Systems Department, UMBC
-
Securing Organizational Knowledge using Automated Annotation
By Savitha Kadiyala, K.R. Namuduri, Venu Dasigi
-
Information Theoretic Model for Inference Resistant Knowledge
Management in RBAC Based Collaborative Environment By Manish
Gupta, Sivakumar Chennuru
-
A Multi-Disciplinary Approach for Countering Insider Threats
From Syracuse Research Corporation and Syracuse University
-
A Game-theoretic Approach to the Design of Self-Protection and
Self-Healing Mechanisms in Autonomic Computing Systems By
Birendra Mishra, Anderson School of Management, U C Riverside
and T. S. Raghu, W. P. Carey School of Business, Arizona State
University