Sciweavers

2236 search results - page 203 / 448
» Secure Software Design in Practice
Sort
View
CCS
2005
ACM
15 years 9 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha
WICSA
2004
15 years 5 months ago
An Externalized Infrastructure for Self-Healing Systems
Software architecture descriptions can play a wide variety of roles in the software lifecycle, from requirements specification, to logical design, to implementation architectures....
David S. Wile, Alexander Egyed
140
Voted
SENSYS
2003
ACM
15 years 9 months ago
SIA: secure information aggregation in sensor networks
Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sen...
Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perr...
TIFS
2010
173views more  TIFS 2010»
15 years 2 months ago
A hybrid approach for generating secure and discriminating face template
Abstract—Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store t...
Yi C. Feng, Pong C. Yuen, Anil K. Jain
ENVSOFT
2007
78views more  ENVSOFT 2007»
15 years 3 months ago
CREDOS: A Conservation Reserve Evaluation And Design Optimisation System
A number of spatial decision support systems (SDSSs) are already available for the systematic planning of conservation reserves. These existing systems offer varying levels of int...
Neville D. Crossman, Lyall M. Perry, Brett A. Brya...