Sciweavers

1597 search results - page 22 / 320
» Mental Models of Computer Security
Sort
View
JDCTA
2010
172views more  JDCTA 2010»
14 years 8 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
ACSAC
2004
IEEE
15 years 5 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
EUROCRYPT
2008
Springer
15 years 3 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
CIS
2006
Springer
15 years 5 months ago
Security Contexts in Autonomic Systems
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the tradit...
Kaiyu Wan, Vasu S. Alagar
OZCHI
2009
ACM
15 years 6 months ago
When three worlds collide: a model of the tangible interaction process
The design of Tangible Interfaces has already evolved since the first projects were developed. Frameworks and taxonomies have helped to understand the field of Tangible Interactio...
Marc Hermann, Michael Weber