Sciweavers

2429 search results - page 294 / 486
» Using Aspects to Design a Secure System
Sort
View
LOCWEB
2009
ACM
15 years 9 months ago
Binding privacy rules to location on the web
As a tool for mitigating the potential privacy risks of gathering and transmitting location information on the Web, we suggest in this paper a model for conveying location informa...
Alissa Cooper, John Morris
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
15 years 10 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
INTERACT
2003
15 years 4 months ago
Chemistry Education: A Tangible Interaction Approach
: This system paper reports on some of the advantages tangible interaction can bring to chemistry education. The paper describes how we realized a Tangible User Interface (TUI) cal...
Morten Fjeld, Patrick Juchli, Benedikt M. Voegtli
ARC
2009
Springer
241views Hardware» more  ARC 2009»
15 years 10 months ago
Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm
As the need for information security increases in our everyday life, the job of encoding/decoding for secure information delivery becomes a critical issue in data network systems. ...
Jaeyoung Yi, Karam Park, Joonseok Park, Won Woo Ro
SACMAT
2009
ACM
15 years 9 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...