Sciweavers

12478 search results - page 290 / 2496
» Secure Interaction Design
Sort
View
TCS
2010
15 years 3 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
176
Voted
RE
2010
Springer
14 years 11 months ago
A UML-based static verification framework for security
Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates...
Igor Siveroni, Andrea Zisman, George Spanoudakis
HICSS
2010
IEEE
203views Biometrics» more  HICSS 2010»
15 years 11 months ago
Secure Planning of Order Picking Systems with the Aid of Simulation
Planning a new logistics center is a quite difficult job. Depending on the requirements there are a great number of possible design versions. The planner has to consider not only ...
Alexander Ulbrich, Stefan Galka, Willibald A. G&uu...
VEE
2012
ACM
239views Virtualization» more  VEE 2012»
14 years 9 days ago
Facilitating inter-application interactions for OS-level virtualization
OS-level virtualization generates a minimal start-up and run-time overhead on the host OS and thus suits applications that require both good isolation and high efficiency. However...
Zhiyong Shan, Xin Wang 0001, Tzi-cker Chiueh, Xiao...
CHI
2008
ACM
16 years 5 months ago
Distributed participatory design
This paper contains a study on how Participatory Design (PD) and distributed software development (DSD) are linked up and whether Distributed Participatory Design is an inherent pa...
Karin Danielsson, Amir M. Naghsh, Dorina C. Gumm, ...