Sciweavers

1281 search results - page 15 / 257
» BASIS: A Biological Approach to System Information Security
Sort
View
CHI
2008
ACM
13 years 9 months ago
Sesame: informing user security decisions with system visualization
Non-expert users face a dilemma when making security decisions. Their security often cannot be fully automated for them, yet they generally lack both the motivation and technical ...
Jennifer Stoll, Craig S. Tashman, W. Keith Edwards...
CSFW
2005
IEEE
14 years 1 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
NAR
2007
216views more  NAR 2007»
13 years 6 months ago
SYSTOMONAS - an integrated database for systems biology analysis of Pseudomonas
To provide an integrated bioinformatics platform for a systems biology approach to the biology of pseudomonads in infection and biotechnology the database SYSTOMONAS (SYSTems biol...
Claudia Choi, Richard Münch, Stefan Leupold, ...
ANSS
2007
IEEE
14 years 1 months ago
Evaluating the Design of Biological Cells Using a Computer Workbench
For embedded systems as well as for biological cell systems, design is a feature that defines their identity. The assembly of different components in designs of both systems can ...
Tessa E. Pronk, Simon Polstra, Andy D. Pimentel, T...
LCN
2006
IEEE
14 years 1 months ago
Efficient Algorithms for Secure Multicast key Management
Group Multicast is becoming a prevalent issue in Network applications such as teleconferencing, payper-view, and information services. In order to secure group communications by p...
Elham Khabiri, Saïd Bettayeb