Provider Policy

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 29259 Experts worldwide ranked by ideXlab platform

Patrick Mcdaniel - One of the best experts on this subject based on the ideXlab platform.

  • semantically rich application centric security in android
    Security and Communication Networks, 2012
    Co-Authors: Machigar Ongtang, Stephen Mclaughlin, William Enck, Patrick Mcdaniel
    Abstract:

    Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use as dictated by application Provider Policy. An in-depth description of the semantics of application Policy is presented. The architecture and technical detail of Saint are given, and areas for extension, optimization, and improvement are explored. We demonstrate through a concrete example and study of real-world applications that Saint provides necessary utility for applications to assert and control the security decisions on the platform. Copyright © 2012 John Wiley & Sons, Ltd.

  • semantically rich application centric security in android
    Annual Computer Security Applications Conference, 2009
    Co-Authors: Machigar Ongtang, Stephen Mclaughlin, William Enck, Patrick Mcdaniel
    Abstract:

    Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use as dictated by application Provider Policy. An in-depth description of the semantics of application Policy is presented. The architecture and technical detail of Saint is given, and areas for extension, optimization, and improvement explored. As we show through concrete example, Saint provides necessary utility for applications to assert and control the security decisions on the platform.

Machigar Ongtang - One of the best experts on this subject based on the ideXlab platform.

  • semantically rich application centric security in android
    Security and Communication Networks, 2012
    Co-Authors: Machigar Ongtang, Stephen Mclaughlin, William Enck, Patrick Mcdaniel
    Abstract:

    Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use as dictated by application Provider Policy. An in-depth description of the semantics of application Policy is presented. The architecture and technical detail of Saint are given, and areas for extension, optimization, and improvement are explored. We demonstrate through a concrete example and study of real-world applications that Saint provides necessary utility for applications to assert and control the security decisions on the platform. Copyright © 2012 John Wiley & Sons, Ltd.

  • semantically rich application centric security in android
    Annual Computer Security Applications Conference, 2009
    Co-Authors: Machigar Ongtang, Stephen Mclaughlin, William Enck, Patrick Mcdaniel
    Abstract:

    Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use as dictated by application Provider Policy. An in-depth description of the semantics of application Policy is presented. The architecture and technical detail of Saint is given, and areas for extension, optimization, and improvement explored. As we show through concrete example, Saint provides necessary utility for applications to assert and control the security decisions on the platform.

William Enck - One of the best experts on this subject based on the ideXlab platform.

  • semantically rich application centric security in android
    Security and Communication Networks, 2012
    Co-Authors: Machigar Ongtang, Stephen Mclaughlin, William Enck, Patrick Mcdaniel
    Abstract:

    Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use as dictated by application Provider Policy. An in-depth description of the semantics of application Policy is presented. The architecture and technical detail of Saint are given, and areas for extension, optimization, and improvement are explored. We demonstrate through a concrete example and study of real-world applications that Saint provides necessary utility for applications to assert and control the security decisions on the platform. Copyright © 2012 John Wiley & Sons, Ltd.

  • semantically rich application centric security in android
    Annual Computer Security Applications Conference, 2009
    Co-Authors: Machigar Ongtang, Stephen Mclaughlin, William Enck, Patrick Mcdaniel
    Abstract:

    Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use as dictated by application Provider Policy. An in-depth description of the semantics of application Policy is presented. The architecture and technical detail of Saint is given, and areas for extension, optimization, and improvement explored. As we show through concrete example, Saint provides necessary utility for applications to assert and control the security decisions on the platform.

Stephen Mclaughlin - One of the best experts on this subject based on the ideXlab platform.

  • semantically rich application centric security in android
    Security and Communication Networks, 2012
    Co-Authors: Machigar Ongtang, Stephen Mclaughlin, William Enck, Patrick Mcdaniel
    Abstract:

    Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use as dictated by application Provider Policy. An in-depth description of the semantics of application Policy is presented. The architecture and technical detail of Saint are given, and areas for extension, optimization, and improvement are explored. We demonstrate through a concrete example and study of real-world applications that Saint provides necessary utility for applications to assert and control the security decisions on the platform. Copyright © 2012 John Wiley & Sons, Ltd.

  • semantically rich application centric security in android
    Annual Computer Security Applications Conference, 2009
    Co-Authors: Machigar Ongtang, Stephen Mclaughlin, William Enck, Patrick Mcdaniel
    Abstract:

    Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use as dictated by application Provider Policy. An in-depth description of the semantics of application Policy is presented. The architecture and technical detail of Saint is given, and areas for extension, optimization, and improvement explored. As we show through concrete example, Saint provides necessary utility for applications to assert and control the security decisions on the platform.

Halina Wiczyk - One of the best experts on this subject based on the ideXlab platform.

  • fertility services for human immunodeficiency virus positive patients Provider Policy practice and perspectives
    Fertility and Sterility, 2008
    Co-Authors: Julie A Stanitis, Daniel Grow, Halina Wiczyk
    Abstract:

    Objective To examine demand for, and access to, fertility services for HIV-positive patients in the United States. Design An electronic survey. Setting The URL for the Web-based survey was e-mailed to those surveyed. Patient(s) The 916 members of the Society of Reproductive Endocrinology and Infertility of the American Society of Reproductive Medicine. Main Outcome Measure(s) Policy and practice in evaluation and treatment of HIV-positive and HIV-serodiscordant couples who desire conception, demand for services, and perceived barriers to providing these services. Result(s) The response rate was 22%. Forty percent of respondents reported policies. Fifty-one percent reported requests. Sixty-four percent reported offering treatment to HIV-serodiscordant couples, and 57% reported offering treatment to HIV-positive couples. Treatments most frequently offered to HIV-serodiscordant male-positive couples were reproductive surgery (50%), ovulation induction (46%), and intracytoplasmic sperm injection (45%). Twenty-nine percent of those offering treatment test-washed specimens for HIV. Factors limiting care included the following: low volume of requests (45%), concern for child welfare (37%), no laboratory Policy (32%), and legal risk (32%). Conclusion(s) Patients who are HIV-positive are seeking fertility services in the United States. The small demand is a major limiting factor to provision of services. There is a lack of global application of current American Society of Reproductive Medicine guidelines. Provider education is needed to ensure that the safest reproductive services are offered to HIV-positive patients. Legal reform is imperative to improve access to reproductive services for the HIV-positive population.