Sciweavers

123 search results - page 12 / 25
» Modeling the Trust Boundaries Created by Securable Objects
Sort
View
89
Voted
IJNSEC
2008
108views more  IJNSEC 2008»
14 years 11 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
86
Voted
HPDC
1996
IEEE
15 years 3 months ago
The Core Legion Object Model
This document describes the core Legion object model. The model specifies the composition and functionality of Legion's core objects--those objects that cooperate to create, ...
Michael J. Lewis, Andrew S. Grimshaw
CORR
2008
Springer
143views Education» more  CORR 2008»
14 years 12 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
CGF
2010
128views more  CGF 2010»
14 years 12 months ago
Moving Least Squares Coordinates
We propose a new family of barycentric coordinates that have closed-forms for arbitrary 2D polygons. These coordinates are easy to compute and have linear precision even for open ...
Josiah Manson, Scott Schaefer
3DIM
2007
IEEE
15 years 6 months ago
Image-based Model Completion
Geometric models created from range sensors are usually incomplete. Considerable effort has been made to fix this problem, ranging from manual repairing to geometric interpolatio...
Alan Brunton, Stefanie Wuhrer, Chang Shu