Sciweavers

274 search results - page 46 / 55
» An Alternative to Deep Case for Representing Relational Info...
Sort
View
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 9 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
AUTOMATICA
2002
79views more  AUTOMATICA 2002»
13 years 7 months ago
Robust performance assessment of feedback control systems
Abstract. The proper measure of closed-loop performance variation in the presence of modelplant mismatch is discussed in this paper. A generalized closed-loop error transfer functi...
Sheng Wan, Biao Huang
ASIACRYPT
2006
Springer
13 years 11 months ago
Secure Sketch for Biometric Templates
There have been active discussions on how to derive a consistent cryptographic key from noisy data such as biometric templates, with the help of some extra information called a ske...
Qiming Li, Yagiz Sutcu, Nasir D. Memon
WWW
2009
ACM
14 years 8 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
ICSM
2002
IEEE
14 years 24 days ago
Constraining Software Evolution
Software is multidimensional but the tools that support it are not. The lack of tool support causes the software artifacts representing different dimensions to evolve independentl...
Steven P. Reiss