Sciweavers

5722 search results - page 262 / 1145
» Security Function Interactions
Sort
View
CP
2006
Springer
15 years 7 months ago
Interactive Distributed Configuration
Interactive configuration is the concept of assisting a user in selecting values for parameters that respect given constraints. It was originally inspired by the product configurat...
Peter Tiedemann, Tarik Hadzic, Thomas Stuart Henne...
BCSHCI
2009
15 years 4 months ago
Putting the physical into the digital: issues in designing hybrid interactive surfaces
Hybrid surfaces are interactive systems combining techniques of direct-manipulation multi-touch surface interaction with elements of tangible user interfaces (TUIs). The design sp...
David S. Kirk, Abigail Sellen, Stuart Taylor, Nico...
CCS
2005
ACM
15 years 8 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha
ESOP
2010
Springer
16 years 16 days ago
Automating Security Mediation Placement
Abstract. We present a framework that automatically produces suggestions to resolve type errors in security-typed programs, enabling legacy code to be retrofit with comprehensive s...
Dave King 0002, Divya Muthukumaran, Sanjit A. Sesh...
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
15 years 9 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...