Sciweavers

171 search results - page 31 / 35
» Improving Computer Security Using Extended Static Checking
Sort
View
ECCV
2000
Springer
14 years 8 months ago
Multibody Structure and Motion: 3-D Reconstruction of Independently Moving Objects
Abstract. This paper extends the recovery of structure and motion to image sequences with several independently moving objects. The motion, structure, and camera calibration are al...
Andrew W. Fitzgibbon, Andrew Zisserman
DRM
2007
Springer
14 years 26 days ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
PERCOM
2009
ACM
14 years 7 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...
TITB
2010
128views Education» more  TITB 2010»
13 years 1 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
MMMACNS
2005
Springer
14 years 5 days ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...