Sciweavers

2358 search results - page 387 / 472
» A Secure Pervasive Environment
Sort
View
FM
2008
Springer
130views Formal Methods» more  FM 2008»
15 years 1 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
BCSHCI
2008
15 years 1 months ago
The HCI lab at UNC Charlotte
At the Human Computer Interaction Lab (HCILab) at UNC Charlotte, we investigate novel ways for people to interact with computers, and through computers with their environments. Ou...
Celine Latulipe, Heather Richter Lipford
DAGSTUHL
2007
15 years 1 months ago
CodeVoting: protecting against malicious vote manipulation at the voter's PC
Voting in uncontrolled environments, such as the Internet comes with a price, the price of having to trust in uncontrolled machines the collection of voter’s vote. An uncontrolle...
Rui Joaquim, Carlos Ribeiro
SE
2007
15 years 1 months ago
Integration models in a .NET plug-in framework
Abstract: Applications based on plug-in architectures are extensible through thirdparties and enable customized user environments. We argue that extensibility and customization are...
Reinhard Wolfinger, Herbert Prähofer
CSREASAM
2006
15 years 1 months ago
MRAS: A Multi-Layered Remote Authentication System
: Accessing computer resources from off campus has been a continuing problem for both students and faculty, and this problem has been exacerbated by the growth of our graduate prog...
Wilfrid Mirville, Jamie Kobie, Michael Nelson