Sciweavers

63 search results - page 12 / 13
» Reasoning about Attribute Authenticity in a Web Environment
Sort
View
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
14 years 1 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
LADC
2007
Springer
14 years 16 days ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
DAGSTUHL
2006
13 years 7 months ago
Hierarchies Relating Topology and Geometry
Cognitive Vision has to represent, reason and learn about objects in its environment it has to manipulate and react to. There are deformable objects like humans which cannot be des...
Walter G. Kropatsch, Yll Haxhimusa, Pascal Lienhar...
KESAMSTA
2010
Springer
13 years 4 months ago
Modeling and Verifying Business Interactions via Commitments and Dialogue Actions
A variety of business interactions in open environments can be captured in terms of creation and manipulation of social commitments among the agents. Such interactions include B2B ...
Mohamed El-Menshawy, Jamal Bentahar, Rachida Dssou...
DGO
2006
134views Education» more  DGO 2006»
13 years 7 months ago
Next steps in near-duplicate detection for eRulemaking
Large volume public comment campaigns and web portals that encourage the public to customize form letters produce many near-duplicate documents, which increases processing and sto...
Hui Yang, Jamie Callan, Stuart W. Shulman