Sciweavers

168 search results - page 26 / 34
» An Automated Approach to Transform Use Cases into Activity D...
Sort
View
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
14 years 3 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
GPCE
2007
Springer
14 years 2 months ago
Generative programming techniques for Java library migration
Embedded systems can be viewed as scaled-down versions of their one counterparts. In many cases, the software abstractions and libraries for embedded systems can be derived from l...
Victor L. Winter, Azamatbek Mametjanov
CCS
2007
ACM
14 years 2 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
VLC
2008
156views more  VLC 2008»
13 years 8 months ago
An agent-based framework for sketched symbol interpretation
Recognizing hand-sketched symbols is a definitely complex problem. The input drawings are often intrinsically ambiguous, and require context to be interpreted in a correct way. Ma...
Giovanni Casella, Vincenzo Deufemia, Viviana Masca...
ASWEC
2008
IEEE
14 years 3 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...