Sciweavers

1587 search results - page 60 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
123
Voted
CHI
2007
ACM
16 years 3 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
NDSS
2003
IEEE
15 years 7 months ago
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use t...
Tal Garfinkel
121
Voted
ICSAP
2009
15 years 9 days ago
Omnidirectional Surveillance System for Digital Home Security
This paper proposed an efficient omnidirectional surveillance system for digital home security. In this surveillance system, the omnidirectional scenes in a room, kitchen, car porc...
Wai Kit Wong, Joanne Tze Yen Liew, Chu Kiong Loo, ...
CODES
2005
IEEE
15 years 8 months ago
Microcoded coprocessor for embedded secure biometric authentication systems
We design and implement a cryptographic biometric authentication system using a microcoded architecture. The secure properties of the biometric matching process are obtained by me...
Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhe...
144
Voted
TPDS
2008
106views more  TPDS 2008»
15 years 2 months ago
Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters
Security is increasingly becoming an important issue in the design of real-time parallel applications, which are widely used in the industry and academic organizations. However, ex...
Tao Xie 0004, Xiao Qin