Sciweavers

16 search results - page 2 / 4
» jcs 2010
Sort
View
JCS
2010
67views more  JCS 2010»
13 years 3 months ago
Assurance for federated identity management
Adrian Baldwin, Marco Casassa Mont, Yolanta Beres,...
JCS
2010
151views more  JCS 2010»
12 years 11 months ago
Biometric template protection in multimodal authentication systems based on error correcting codes
Savvas Argyropoulos, Dimitrios Tzovaras, Dimosthen...
JCS
2010
124views more  JCS 2010»
13 years 3 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
JCS
2010
122views more  JCS 2010»
13 years 3 months ago
Provably correct inline monitoring for multithreaded Java-like programs
Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract paradigm proposed by the EU FP6 S3 MS project uses...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...