Sciweavers

4731 search results - page 228 / 947
» Securing Interactive Programs
Sort
View
ICSE
2008
IEEE-ACM
16 years 2 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
119
Voted
DISCEX
2003
IEEE
15 years 7 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
IWEC
2004
15 years 3 months ago
The Design and Implementation of Multi-player Card Games on Multi-user Interactive Tabletop Surfaces
We present the design and implementation of a card game architecture for mulit-user interactive tabletop surfaces. Our system is built on the DiamondTouch, a touch-sensitive input ...
Shwetak N. Patel, John A. Bunch, Kyle D. Forkner, ...
119
Voted
IPPS
2005
IEEE
15 years 8 months ago
Characterizing Secure Dynamic Web Applications Scalability
Security in the access to web contents and the interaction with web sites is becoming one of the most important issues in Internet. Servers need to provide certain levels of secur...
Jordi Guitart, Vicenç Beltran, David Carrer...
USENIX
2004
15 years 3 months ago
Reliability and Security in the CoDeeN Content Distribution Network
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running distributed services that interact with other resources on the Web. The CoDeeN C...
Limin Wang, KyoungSoo Park, Ruoming Pang, Vivek S....