Sciweavers

300 search results - page 32 / 60
» Enterprise Security: A Community of Interest Based Approach
Sort
View
CORR
2010
Springer
111views Education» more  CORR 2010»
13 years 8 months ago
Towards Public Key Infrastructure less authentication in Session Initiation Protocol
The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for...
Abdullah Al Hasib, Abdullah Azfar, Md. Sarwar Mors...
TVCG
2012
191views Hardware» more  TVCG 2012»
11 years 11 months ago
Facial Performance Transfer via Deformable Models and Parametric Correspondence
—The issue of transferring facial performance from one person’s face to another’s has been an area of interest for the movie industry and the computer graphics community for ...
Akshay Asthana, Miles de la Hunty, Abhinav Dhall, ...
ERSA
2006
197views Hardware» more  ERSA 2006»
13 years 10 months ago
A High Speed, Run Time Reconfigurable Image Acquisition processor for a Missile Approach Warning System
High frame rate video capture and image processing is an important capability for applications in defense and homeland security where incoming missiles must be detected in very sh...
Vinay Sriram, David Kearney
MEDES
2010
ACM
13 years 3 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
ITRUST
2004
Springer
14 years 2 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...