Sciweavers

2281 search results - page 233 / 457
» Security Patterns and Secure Systems Design
Sort
View
CHI
2010
ACM
15 years 6 months ago
Vote-o-graph: a dishonest touchscreen voting system
We present Vote-O-Graph, an experimental touchscreen voting system designed to simulate reported interface issues in existing electronic voting systems. Touchscreen miscalibration...
Andrea L. Mascher, Paul T. Cotton, Douglas W. Jone...
ECR
2010
129views more  ECR 2010»
15 years 1 months ago
The design of a reliable reputation system
Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse user populations spread across numerous administrative and security domains. Zero...
Gayatri Swamynathan, Kevin C. Almeroth, Ben Y. Zha...
WICSA
2004
15 years 2 months ago
An Externalized Infrastructure for Self-Healing Systems
Software architecture descriptions can play a wide variety of roles in the software lifecycle, from requirements specification, to logical design, to implementation architectures....
David S. Wile, Alexander Egyed
PPL
2008
117views more  PPL 2008»
15 years 1 months ago
Operating Systems in silicon and the Dynamic Management of Resources in Many-Core Chips
This discussion paper explores the problems of operating systems support when implementing concurrency controls at the level of the instruction set in processors designed for mult...
Chris R. Jesshope
SACMAT
2003
ACM
15 years 6 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck