Sciweavers

123 search results - page 17 / 25
» Modeling the Trust Boundaries Created by Securable Objects
Sort
View
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
15 years 6 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila
PUC
2006
72views more  PUC 2006»
14 years 11 months ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon
CVRMED
1997
Springer
15 years 3 months ago
Medical image segmentation using topologically adaptable surfaces
E cient and powerful topologically adaptable deformable surfaces can be created by embedding and de ning discrete deformable surface models in terms of an A ne Cell Decomposition (...
Tim McInerney, Demetri Terzopoulos
SCA
2007
15 years 2 months ago
Liquid simulation on lattice-based tetrahedral meshes
We describe a method for animating incompressible liquids with detailed free surfaces. For each time step, semiLagrangian contouring computes a new fluid boundary (represented as ...
Nuttapong Chentanez, Bryan E. Feldman, Franç...
SAC
2005
ACM
15 years 5 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla