Sciweavers

3544 search results - page 64 / 709
» Information Security in Open Systems
Sort
View
CHI
2010
ACM
15 years 4 months ago
Cooking with robots: designing a household system working in open environments
We propose a cooking system that operates in an open environment. The system cooks a meal by pouring various ingredients into a boiling pot on an induction heating cooker and adju...
Yuta Sugiura, Daisuke Sakamoto, Anusha Indrajith W...
EDOC
2005
IEEE
15 years 4 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
SEC
1997
15 years 9 days ago
A formal model to aid documenting and harmonizing of information security requirements
A formal top down model shall be presented to aid documentation and harmonization of information security requirements. The model formalizes layered development of inn security, w...
Jussipekka Leiwo, Yuliang Zheng
ACMACE
2006
ACM
15 years 5 months ago
Open experiments of mobile sightseeing support systems with shared virtual worlds
In this paper, we describe results from the experiments of a location-dependent shared virtual world system applied to sightseeing entertainment. This system can be used with GPSp...
Hiroyuki Tarumi, Kayo Yokoo, Shouji Nishimoto, Kaz...
CSFW
2004
IEEE
15 years 2 months ago
Lenient Array Operations for Practical Secure Information Flow
Our goal in this paper is to make secure information flow typing more practical. We propose simple and permissive typing rules for array operations in a simple sequential imperati...
Zhenyue Deng, Geoffrey Smith