Sciweavers

341 search results - page 43 / 69
» A Security Engineering Process based on Patterns
Sort
View
IUI
2000
ACM
15 years 6 months ago
Requirements elicitation for an intelligent software test environment for the physically challenged
This paper is about the elicitation of the requirements for an intelligent interface for a software test development environment that will accommodate the physically challenged (P...
Warren Moseley
SACMAT
2009
ACM
15 years 7 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
126
Voted
IUI
2012
ACM
13 years 10 months ago
Airwriting: demonstrating mobile text input by 3D-space handwriting
We demonstrate our airwriting interface for mobile handsfree text entry. The interface enables a user to input text into a computer by writing in the air like on an imaginary blac...
Christoph Amma, Tanja Schultz
TPDS
2008
133views more  TPDS 2008»
15 years 2 months ago
Mutual Anonymity for Mobile P2P Systems
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
Jinsong Han, Yunhao Liu
CCS
2007
ACM
15 years 8 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...