Sciweavers

12478 search results - page 356 / 2496
» Secure Interaction Design
Sort
View
ACSAC
2001
IEEE
15 years 8 months ago
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications
Traditional database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its ...
Peng Liu
MM
2010
ACM
147views Multimedia» more  MM 2010»
15 years 5 months ago
Natural interaction for cultural heritage: the archaeological site of Shawbak
One of the most interesting issues in the field of cultural heritage is the adoption of multimedia systems for the visualization and organization of information. In this paper we ...
Thomas M. Alisi, Gianpaolo D'Amico, Andrea Ferraca...
EPEW
2005
Springer
15 years 10 months ago
Choreographing Security and Performance Analysis for Web Services
We describe a UML-based method which supports model-driven development of service-oriented architectures including those used in Web services. Analysable content is extracted from ...
Stephen Gilmore, Valentin Haenel, Leïla Kloul...
FPL
2001
Springer
92views Hardware» more  FPL 2001»
15 years 9 months ago
Secure Configuration of Field Programmable Gate Arrays
Although SRAM programmed Field Programmable Gate Arrays (FPGA's) have come to dominate the industry due to their density and performance advantages over non-volatile technolog...
Tom Kean
ISICT
2003
15 years 6 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan