Sciweavers

232 search results - page 28 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
CCS
2007
ACM
14 years 4 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
SAC
2009
ACM
14 years 4 months ago
A practical solution for scripting language compilers
Although scripting languages are becoming increasingly popular, even mature scripting language implementations remain interpreted. Several compilers and reimplementations have bee...
Paul Biggar, Edsko de Vries, David Gregg
SOUPS
2006
ACM
14 years 3 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
CHI
2009
ACM
14 years 10 months ago
FacetLens: exposing trends and relationships to support sensemaking within faceted datasets
Previous research has shown that faceted browsing is effective and enjoyable in searching and browsing large collections of data. In this work, we explore the efficacy of interact...
Bongshin Lee, Greg Smith, George G. Robertson, Mar...
CHI
2009
ACM
14 years 10 months ago
Lightweight tagging expands information and activity management practices
Could people use tagging to manage day-to-day work in their personal computing environment? Could tagging be sufficiently generic and lightweight to support diverse ways of workin...
Gerard Oleksik, Max L. Wilson, Craig S. Tashman, E...