Sciweavers

9503 search results - page 29 / 1901
» Authenticated System Calls
Sort
View
TLDI
2010
ACM
190views Formal Methods» more  TLDI 2010»
16 years 1 months ago
Distributed programming with distributed authorization
We propose a programming language, called PCML5, for building distributed applications with distributed access control. Target applications include web-based systems in which prog...
Kumar Avijit, Anupam Datta, Robert Harper
EUROPKI
2007
Springer
15 years 10 months ago
Undeniable Mobile Billing Schemes
An undeniable mobile billing system allows a mobile network service provider to bill its subscribers with trustworthy evidences. Chen, Jan and Chen proposed such a billing system b...
Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen
ICMCS
2006
IEEE
129views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Video Based Person Authentication via Audio/Visual Association
Multi-modal person authentication systems can achieve higher performance and robustness by combining different modalities. The current fusion strategies of different modalities ar...
Ming S. Liu, Thomas S. Huang
CASES
2010
ACM
15 years 2 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
PLDI
2005
ACM
15 years 10 months ago
Checking type safety of foreign function calls
We present a multi-lingual type inference system for checking type safety across a foreign function interface. The goal of our system is to prevent foreign function calls from int...
Michael Furr, Jeffrey S. Foster