Sciweavers

202 search results - page 17 / 41
» Composing and decomposing systems under security properties
Sort
View
ICIP
2010
IEEE
13 years 6 months ago
Rapid stereo-vision enhanced face recognition
This paper presents a real-time face recognition system. The system uses a stereo camera to locate, track, and recognize a person's face. Our algorithm improves state-of-the-...
Sergey Kosov, Thorsten Thormählen, Hans-Peter...
CSFW
2012
IEEE
11 years 11 months ago
Securing Interactive Programs
Abstract—This paper studies the foundations of informationflow security for interactive programs. Previous research assumes that the environment is total, that is, it must alway...
Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld
SACMAT
2009
ACM
14 years 3 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
ENTCS
2002
145views more  ENTCS 2002»
13 years 8 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
CCS
2010
ACM
13 years 7 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim