Sciweavers

2213 search results - page 182 / 443
» Software Security
Sort
View
166
Voted
AVBPA
1997
Springer
140views Biometrics» more  AVBPA 1997»
15 years 7 months ago
Integrating Face Recognition into Security Systems
Automated processing of facial images has become a serious market for both hard- and software products. For the commercial success of face recognition systems it is most crucial th...
Volker Vetter, Thomas Zielke, Werner von Seelen
122
Voted
LISA
2007
15 years 6 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
122
Voted
CORR
2011
Springer
197views Education» more  CORR 2011»
14 years 7 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
126
Voted
OOPSLA
2005
Springer
15 years 9 months ago
A software product line architecture for distributed real-time and embedded systems: a separation of concerns approach
This paper presents a separation of concerns approach to solve the tangling problem of functional and Quality of Service (QoS) concerns in traditional Component-based Software Eng...
Shih-Hsi Liu
116
Voted
CHI
2005
ACM
16 years 4 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...