Results 1 to 10 of about 1,111,986 (335)

Confidentiality [PDF]

open access: yesBMJ, 2008
Confidentiality in the medical setting refers to “the principle of keeping secure and secret from others, information given by or about an individual in the course of a professional relationship,”1 and it is the right of every patient, even after death.2 Breaches of confidentiality are common, albeit usually accidental.2 Around a third of the calls ...
Bourke, J, Wessely, S
openaire   +4 more sources

The U.S. Law of Client Confidentiality: Framework for an International Perspective [PDF]

open access: yes, 1991
In this Article, I will consider two general areas of the U.S. law of confidentiality. In Part I, I will reflect briefly upon what I call “the U.S. culture of lawyer-client confidentiality.” I say “culture” rather than “cult,” and one must guard against ...
Barbara Casadei   +10 more
core   +2 more sources

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

Best Effort and Practice Activation Codes [PDF]

open access: yes, 2010
Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent ...
Furnell, S.   +4 more
core   +4 more sources

Towards security monitoring patterns [PDF]

open access: yes, 2007
Runtime monitoring is performed during system execution to detect whether the system’s behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that expresses the requirements to be ...
Androutsopoulos, K.   +2 more
core   +2 more sources

Nonmalleable Information Flow: Technical Report

open access: yes, 2017
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen   +2 more
core   +1 more source

Composing security protocols: from confidentiality to privacy [PDF]

open access: yes, 2014
Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular ...
Arapinis, Myrto   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy