Sciweavers

429 search results - page 48 / 86
» Compositionality of Secure Information Flow
Sort
View
ECCV
2004
Springer
14 years 10 months ago
On Refractive Optical Flow
This paper presents a novel generalization of the optical flow equation to the case of refraction, and it describes a method for recovering the refractive structure of an object fr...
Sameer Agarwal, Satya P. Mallick, David J. Kriegma...
ICISS
2005
Springer
14 years 1 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang
CHI
2010
ACM
14 years 2 months ago
Investigating an appropriate design for personal firewalls
Personal firewalls are an important aspect of security for home computer users, but little attention has been given to their usability. We conducted semi-structured interviews to ...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov,...
OOPSLA
1997
Springer
14 years 5 days ago
Composite Design Patterns
ed Abstract Factory is yet another. When patterns cooperate, the cooperation itself can give rise to problems, contexts, trade-offs, and consequences. For instance, should a Visito...
Dirk Riehle
ICALP
2007
Springer
13 years 9 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou