Sciweavers

5722 search results - page 167 / 1145
» Security Function Interactions
Sort
View
BMCBI
2007
107views more  BMCBI 2007»
15 years 24 days ago
Reuse of structural domain-domain interactions in protein networks
Background: Protein interactions are thought to be largely mediated by interactions between structural domains. Databases such as iPfam relate interactions in protein structures t...
Benjamin Schuster-Böckler, Alex Bateman
98
Voted
IFIP
2004
Springer
15 years 6 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci
111
Voted
VRCAI
2006
ACM
15 years 6 months ago
Advanced virtual reality technologies for surveillance and security applications
We present a system that exploits advanced Virtual Reality technologies to create a surveillance and security system. Surveillance cameras are carried by a mini Blimp which is tel...
Renaud Ott, Mario Gutiérrez, Daniel Thalman...
86
Voted
OZCHI
2005
ACM
15 years 6 months ago
Spy-resistant keyboard: more secure password entry on public touch screen displays
Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typing or handwriting. These techniques are poor for entering priv...
Desney S. Tan, Pedram Keyani, Mary Czerwinski
120
Voted
CASSIS
2004
Springer
15 years 6 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann