Sciweavers

2281 search results - page 187 / 457
» Security Patterns and Secure Systems Design
Sort
View
OOPSLA
2007
Springer
15 years 6 months ago
Compile-time execution structure of object-oriented programs with practical ownership domain annotations
Ownership domain annotations express and enforce design intent related to object encapsulation and communication directly in real object-oriented code. First, this work will make ...
Marwan Abi-Antoun
111
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
116
Voted
CORR
2011
Springer
188views Education» more  CORR 2011»
14 years 7 months ago
Composition of Management System for Smart Homes
—The paper addresses modular hierarchical design (composition) of a management system for smart homes. The management system consists of security subsystem (access control, alarm...
Mark Sh. Levin, Aliaksei Andrushevich, Alexander K...
121
Voted
BCSHCI
2009
14 years 10 months ago
Digital parenting: designing children's safety
In this paper, I describe an ethnographic study of children and parents looking at issues of domestic privacy and security. I will provide an overview of parental rules and strate...
Jennifer A. Rode
97
Voted
FPGA
2009
ACM
285views FPGA» more  FPGA 2009»
15 years 7 months ago
PERG-Rx: a hardware pattern-matching engine supporting limited regular expressions
PERG is a pattern matching engine designed for locating predefined byte string patterns (rules) from the ClamAV virus signature database in a data stream. This paper presents PERG...
Johnny Tsung Lin Ho, Guy G. Lemieux