Sciweavers

2486 search results - page 113 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
CCS
2007
ACM
14 years 3 months ago
Uclinux: a linux security module for trusted-computing-based usage controls enforcement
Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted Computing Group has standardized Trusted Platform Modu...
David Kyle, José Carlos Brustoloni
AICCSA
2005
IEEE
138views Hardware» more  AICCSA 2005»
14 years 2 months ago
Design, implementation and testing of mobile agent protection mechanism for MANETS
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
K. E. A. Negm
SIGCSE
2008
ACM
169views Education» more  SIGCSE 2008»
13 years 8 months ago
APOGEE: automated project grading and instant feedback system for web based computing
Providing consistent, instant, and detailed feedback to students has been a big challenge in teaching Web based computing, given the complexity of project assignments and the comp...
Xiang Fu, Boris Peltsverger, Kai Qian, Lixin Tao, ...
HUC
2004
Springer
14 years 2 months ago
Personalized Peripheral Information Awareness Through Information Art
Abstract. This article describes development of the concept of Information Art, a type of ambient or peripheral display involving user-specified electronic paintings in which resi...
John T. Stasko, Todd Miller, Zachary Pousman, Chri...
RTCSA
2000
IEEE
14 years 1 months ago
Extracting safe and precise control flow from binaries
As a starting point for static program analysis a control flow graph (CFG) is needed. If only the binary executable is available, this CFG has to be reconstructed from sequences ...
Henrik Theiling