Sciweavers

1585 search results - page 66 / 317
» Automatically optimizing secure computation
Sort
View
INAP
2001
Springer
14 years 10 days ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...

Source Code
9636views
15 years 8 months ago
2D-3D Automatic Mesh Generation
NETGEN is an open source automatic mesh generation tool for two and three dimensions. It comes as a stand alone program with graphical user interface, or as a C++ library to be lin...
Joachim Schöberl
MSWIM
2006
ACM
14 years 1 months ago
Performance modeling of critical event management for ubiquitous computing applications
A generic theoretical framework for managing critical events in ubiquitous computing systems is presented. The main idea is to automatically respond to occurrences of critical eve...
Tridib Mukherjee, Krishna M. Venkatasubramanian, S...
TDSC
2010
172views more  TDSC 2010»
13 years 2 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
CHI
2008
ACM
14 years 8 months ago
Talc: using desktop graffiti to fight software vulnerability
With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...