Sciweavers

40 search results - page 2 / 8
» Using Visual Challenges to Verify the Integrity of Security ...
Sort
View
JCP
2008
116views more  JCP 2008»
13 years 5 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
SIGOPSE
2004
ACM
13 years 10 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase
TCSV
2011
13 years 8 days ago
Integrating Spatio-Temporal Context With Multiview Representation for Object Recognition in Visual Surveillance
—We present in this paper an integrated solution to rapidly recognizing dynamic objects in surveillance videos by exploring various contextual information. This solution consists...
Xiaobai Liu, Liang Lin, Shuicheng Yan, Hai Jin, We...
CVPR
2005
IEEE
14 years 7 months ago
A Projector-Camera System with Real-Time Photometric Adaptation for Dynamic Environments
Projection systems can be used to implement augmented reality, as well as to create both displays and interfaces on ordinary surfaces. Ordinary surfaces have varying reflectance, ...
Kensaku Fujii, Michael D. Grossberg, Shree K. Naya...
WETICE
2003
IEEE
13 years 10 months ago
Supporting Digital Signatures in Mobile Environments
Digital signatures, like physical signatures, can verify that a specific user affixed their signature to a document and they can also verify that the document is the same as when ...
Scott Campbell