Sciweavers

2429 search results - page 278 / 486
» Using Aspects to Design a Secure System
Sort
View
SAC
2006
ACM
15 years 9 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
SACMAT
2005
ACM
15 years 8 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
SOUPS
2010
ACM
15 years 7 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
ER
2005
Springer
155views Database» more  ER 2005»
15 years 8 months ago
Applying Transformations to Model Driven Development of Web Applications
Nowadays, the maturity reached by the Web engineering research community can be assessed by the myriad of web design methods that have proven successful for the specification of th...
Santiago Meliá, Jaime Gómez
INTERACT
2003
15 years 4 months ago
Enticing People to Interact with Large Public Displays in Public Spaces
: Large displays are increasingly being placed in public places to support community and social activities. However, a major problem that has been observed with this new form of pu...
Harry Brignull, Yvonne Rogers