Sciweavers

205 search results - page 23 / 41
» Foundations for Intrusion Prevention
Sort
View
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 1 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
73
Voted
CGI
2006
IEEE
15 years 3 months ago
A Feature-Preserving and Volume-Constrained Flow for Fairing Irregular Meshes
In this paper, we introduce a novel approach to denoise meshes taking the balanced flow equation as the theoretical foundation.The underlying model consists of an anisotropic diï¬...
Chunxia Xiao, Shu Liu, Qunsheng Peng, A. Robin For...
75
Voted
ASWEC
2004
IEEE
15 years 1 months ago
Obstacles to a Totally Functional Programming Style
"Totally Functional Programming" (TFP) advocates the complete replacement of symbolic representations for data by functions. TFP is motivated by observations from practi...
Paul A. Bailes, Colin J. M. Kemp
WSCG
2004
115views more  WSCG 2004»
14 years 11 months ago
A Public-key Asymmetric Robust Watermarking Algorithm Based on Signal with Special Correlation Characteristic
A public-key asymmetric robust watermarking algorithm based on signal with special correlation characteristic is proposed in this paper. This algorithm is designed to permit pubic...
Yanjun Hu, Li Gao, Xiaoping Ma, Zhigeng Pan, Li Li
APSCC
2008
IEEE
15 years 4 months ago
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures
Software systems today often run in malicious environments in which attacks or intrusions are quite common. This situation has brought security concerns into the development of so...
Yanguo Liu, Issa Traoré, Alexander M. Hoole