Sciweavers

2236 search results - page 190 / 448
» Secure Software Design in Practice
Sort
View
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 10 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
ASPLOS
2008
ACM
15 years 6 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
134
Voted
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
15 years 10 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
CONTEXT
1999
Springer
15 years 8 months ago
Ecological Interfaces: Extending the Pointing Paradigm by Visual Context
Following the ecological approach to visual perception, this paper presents an innovative framework for the design of multimodal systems. The proposal emphasises the role of the vi...
Antonella De Angeli, Laurent Romary, Frederic Wolf...
229
Voted
SIGMOD
2008
ACM
182views Database» more  SIGMOD 2008»
16 years 4 months ago
Multi-tenant databases for software as a service: schema-mapping techniques
In the implementation of hosted business services, multiple tenants are often consolidated into the same database to reduce total cost of ownership. Common practice is to map mult...
Stefan Aulbach, Torsten Grust, Dean Jacobs, Alfons...