Sciweavers

739 search results - page 112 / 148
» Information Flow in Credential Systems
Sort
View
HT
2005
ACM
14 years 1 months ago
The StorySpinner sculptural reader
This demo is of a hypertext reading system called StorySpinner. It follows the sculptural hypertext methodology and has been used as a test bed for experimenting with the authorin...
Clare J. Hooper, Mark J. Weal
DAC
2008
ACM
13 years 9 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
AVI
2004
13 years 9 months ago
Visualizing programs with Jeliot 3
We present a program visualization tool called Jeliot 3 that is designed to aid novice students to learn procedural and object oriented programming. The key feature of Jeliot is t...
Andrés Moreno, Niko Myller, Erkki Sutinen, ...
CSREASAM
2009
13 years 8 months ago
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process
Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, i...
Michael R. Grimaila, Larry Fortson, Janet Sutton
VLDB
2007
ACM
89views Database» more  VLDB 2007»
14 years 1 months ago
GhostDB: Hiding Data from Prying Eyes
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Christophe Salperwyck, Nicolas Anciaux, Mehdi Benz...