Sciweavers

5475 search results - page 187 / 1095
» Model Driven Security
Sort
View
INTERACT
2007
15 years 5 months ago
Motivational Needs-Driven Mobile Phone Design
This paper provides support for the use of motivational needs in identifying mobile phone uses and related features. Drawing on motivational human and usage space research, the fin...
Judy van Biljon, Paula Kotzé, Gary Marsden
127
Voted
NIPS
1996
15 years 5 months ago
Combining Neural Networks and Context-Driven Search for On-Line, Printed Handwriting Recognition in the Newton
While on-line handwriting recognition is an area of long-standing and ongoing research, the recent emergence of portable, pen-based computers has focused urgent attention on usabl...
Larry S. Yaeger, Brandyn J. Webb, Richard F. Lyon
129
Voted
CCECE
2006
IEEE
15 years 9 months ago
AOP Extension for Security Testing of Programs
The purpose of this paper is to use the aspect-oriented programming (AOP) paradigm for security testing. AOP allows security experts to develop and inject separate modules for con...
Nadia Belblidia, Mourad Debbabi, Aiman Hanna, Zhen...
142
Voted
ISF
2007
121views more  ISF 2007»
15 years 3 months ago
Virtual organization security policies: An ontology-based integration approach
Abstract This paper addresses the specification of a security policy ontology framework to mediate security policies between virtual organizations (VO) and real organizations (RO)....
Saravanan Muthaiyah, Larry Kerschberg
146
Voted
CSFW
2011
IEEE
14 years 3 months ago
Security for Key Management Interfaces
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Steve Kremer, Graham Steel, Bogdan Warinschi