Sciweavers

739 search results - page 17 / 148
» Information Flow in Credential Systems
Sort
View
CVPR
2005
IEEE
14 years 9 months ago
Multimodal Face Recognition: Combination of Geometry with Physiological Information
It is becoming increasingly important to be able to credential and identify authorized personnel at key points of entry. Such identity management systems commonly employ biometric...
Ioannis A. Kakadiaris, Georgios Passalis, Theohari...
ESORICS
2004
Springer
14 years 1 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
PLDI
2009
ACM
14 years 8 days ago
Flow-sensitive semantics for dynamic information flow policies
Dynamic information flow policies, such as declassification, are essential for practically useful information flow control systems. However, most systems proposed to date that ...
Niklas Broberg, David Sands
ICDIM
2008
IEEE
14 years 2 months ago
A NetFlow based internet-worm detecting system in large network
Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. ...
CSFW
2005
IEEE
14 years 1 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook