Sciweavers

1147 search results - page 145 / 230
» Transformation of Access Rights
Sort
View
117
Voted
CAV
2007
Springer
111views Hardware» more  CAV 2007»
15 years 4 months ago
Verification Across Intellectual Property Boundaries
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Sagar Chaki, Christian Schallhart, Helmut Veith
CLUSTER
2004
IEEE
15 years 4 months ago
An evaluation of the close-to-files processor and data co-allocation policy in multiclusters
In multicluster systems, and more generally, in grids, jobs may require co-allocation, i.e., the simultaneous allocation of resources such as processors and input files in multipl...
Hashim H. Mohamed, Dick H. J. Epema
81
Voted
USS
2008
15 years 3 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
116
Voted
CIVR
2008
Springer
166views Image Analysis» more  CIVR 2008»
15 years 2 months ago
Content personalization and adaptation for three-screen services
Three-screen services provide the right solution for consumers to access rich multimedia resources by any device, anytime and anywhere. In this paper, we describe a prototype syst...
Zhu Liu, David C. Gibbon, Harris Drucker, Andrea B...
FPLAY
2008
15 years 2 months ago
Lessons from Brain Age on password memorability
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Alain Forget, Sonia Chiasson, Robert Biddle