Sciweavers

5722 search results - page 406 / 1145
» Security Function Interactions
Sort
View
141
Voted
CHI
2011
ACM
14 years 7 months ago
Investigating Phicon feedback in non-visual tangible user interfaces
We investigated ways that users could interact with Phicons in non-visual tabletop tangible user interfaces (TUIs). We carried out a brainstorming and rapid prototyping session wi...
David K. McGookin, Stephen A. Brewster
134
Voted
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 4 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
SACMAT
2009
ACM
15 years 10 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
VOTEID
2007
Springer
15 years 10 months ago
Simulation-Based Analysis of E2E Voting Systems
Abstract. End-to-end auditable voting systems are expected to guarantee very interesting, and often sophisticated security properties, including correctness, privacy, fairness, rec...
Olivier de Marneffe, Olivier Pereira, Jean-Jacques...
ISCC
2000
IEEE
100views Communications» more  ISCC 2000»
15 years 8 months ago
FATIMA: A Firewall-Aware Transparent Internet Mobility Architecture
Ubiquitous communication will be one of the paradigms for the next decades. The use of the Internet in such applications demands for a highly reliable and secure system, especiall...
Stefan Mink, Frank Pählke, Günter Sch&au...