Sciweavers

1949 search results - page 185 / 390
» Protective Interface Specifications
Sort
View
CORR
2008
Springer
150views Education» more  CORR 2008»
15 years 2 months ago
A Local Mean Field Analysis of Security Investments in Networks
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arisi...
Marc Lelarge, Jean Bolot
CASES
2010
ACM
14 years 12 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
SOCIALCOM
2010
14 years 11 months ago
Failure Feedback for User Obligation Systems
In recent years, several researchers have proposed techniques for providing users with assistance in understanding and overcoming authorization denials. The incorporation of envir...
Murillo Pontual, Keith Irwin, Omar Chowdhury, Will...
ICSE
2007
IEEE-ACM
16 years 2 months ago
Supporting Heterogeneous Architecture Descriptions in an Extensible Toolset
Many architecture description languages (ADLs) have been proposed to model, analyze, configure, and deploy complex software systems. To face this diversity, extensible ADLs (or AD...
Ali Erdem Özcan, Jean-Bernard Stefani, Matthi...
MHCI
2009
Springer
15 years 8 months ago
Community Practices and Locative Media
The development of locative media applications is not simply about the physical location or social setting in which the interaction occurs, but rather about situating the media wi...
Katharine S. Willis, Keith Cheverst, Claudia Muell...