Results 1 to 10 of about 1,111,986 (335)
Confidentiality in the medical setting refers to “the principle of keeping secure and secret from others, information given by or about an individual in the course of a professional relationship,”1 and it is the right of every patient, even after death.2 Breaches of confidentiality are common, albeit usually accidental.2 Around a third of the calls ...
Bourke, J, Wessely, S
openaire +4 more sources
The U.S. Law of Client Confidentiality: Framework for an International Perspective [PDF]
In this Article, I will consider two general areas of the U.S. law of confidentiality. In Part I, I will reflect briefly upon what I call “the U.S. culture of lawyer-client confidentiality.” I say “culture” rather than “cult,” and one must guard against ...
Barbara Casadei+10 more
core +2 more sources
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo+3 more
core +2 more sources
Best Effort and Practice Activation Codes [PDF]
Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent ...
Furnell, S.+4 more
core +4 more sources
Towards security monitoring patterns [PDF]
Runtime monitoring is performed during system execution to detect whether the system’s behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that expresses the requirements to be ...
Androutsopoulos, K.+2 more
core +2 more sources
Nonmalleable Information Flow: Technical Report
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen+2 more
core +1 more source
Composing security protocols: from confidentiality to privacy [PDF]
Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular ...
Arapinis, Myrto+2 more
core +3 more sources