Sciweavers

5484 search results - page 14 / 1097
» Almost-Everywhere Secure Computation
Sort
View
OOPSLA
2010
Springer
14 years 9 months ago
Patterns and statistical analysis for understanding reduced resource computing
Martin C. Rinard, Henry Hoffmann, Sasa Misailovic,...
SIGCSE
2004
ACM
95views Education» more  SIGCSE 2004»
15 years 5 months ago
Cryptography and computer security for undergraduates
The panel discusses solutions to the problem of computer security education. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: security and protection. E...
Paul De Palma, Charles Frank, Suzanne E. Gladfelte...
PDCAT
2005
Springer
15 years 5 months ago
Design of a Security Management Middleware in Ubiquitous Computing Environments
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 6 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...