Sciweavers

804 search results - page 83 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
WINET
2002
138views more  WINET 2002»
15 years 4 months ago
An Architecture for Secure Wide-Area Service Discovery
Abstract. The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an int...
Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, ...
PASTE
1999
ACM
15 years 9 months ago
Identifying Procedural Structure in Cobol Programs
The principal control-flow abstraction mechanism in the Cobol language is the PERFORM statement. Normally, PERFORM statements are used in a straightforward manner to define para...
John Field, G. Ramalingam
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 9 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
EMNETS
2007
15 years 8 months ago
Sensor node localisation using a stereo camera rig
In this paper, we use stereo vision processing techniques to detect and localise sensors used for monitoring simulated environmental events within an experimental sensor network t...
Dermot Diamond, Noel E. O'Connor, Alan F. Smeaton,...
GD
1995
Springer
15 years 8 months ago
Graph Folding: Extending Detail and Context Viewing into a Tool for Subgraph Comparisons
It is a di cult problem to display large, complex graphs in a manner which furthers comprehension. A useful approach is to expand selected sections foci of the graph revealing de...
M. Sheelagh T. Carpendale, David J. Cowperthwaite,...