Sciweavers

5722 search results - page 398 / 1145
» Security Function Interactions
Sort
View
OOPSLA
2010
Springer
15 years 2 months ago
Programming with time: cyber-physical programming with impromptu
The act of computer programming is generally considered to be temporally removed from a computer program’s execution. In this paper we discuss the idea of programming as an acti...
Andrew Sorensen, Henry Gardner
OZCHI
2009
ACM
15 years 11 months ago
My phone is my keypad: privacy-enhanced PIN-entry on public terminals
More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations...
Alexander De Luca, Bernhard Frauendienst, Sebastia...
SACMAT
2004
ACM
15 years 9 months ago
On the role of roles: from role-based to role-sensitive access control
This paper maintains that for an access-control mechanism to support a wide range of policies, it is best to dispense with any built-in semantics for roles in the mechanism itself...
Xuhui Ao, Naftaly H. Minsky
IUI
1993
ACM
15 years 8 months ago
The study of models of intelligent interfaces
Researchers in the field of intelligent interfaces have concentrated on building architectures, and have placed little emphasis on defining appropriate models. As a result, this...
Angel R. Puerta
CCS
2009
ACM
15 years 11 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...