Sciweavers

3259 search results - page 544 / 652
» Modeling Autonomous-System Relationships
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 2 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
WETICE
1998
IEEE
14 years 2 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
IH
1998
Springer
14 years 2 months ago
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System
Abstract. Currently knownbasic anonymitytechniques dependon identity veri cation. If veri cation of user identities is not possible due to the related management overhead or a gene...
Dogan Kesdogan, Jan Egner, Roland Büschkes
ACMDIS
1997
ACM
14 years 2 months ago
HCI, Natural Science and Design: A Framework for Triangulation Across Disciplines
Human-computer interaction is multidisciplinary, drawing paradigms and techniques from both the natural sciences and the design disciplines. HCI cannot be considered a pure natura...
Wendy E. Mackay, Anne-Laure Fayard
ISER
1997
Springer
202views Robotics» more  ISER 1997»
14 years 2 months ago
Interactive Visual and Force Rendering of Human-Knee Dynamics
The kinematics and force/displacement relationships of elements of biological joints are notoriously difficult to understand. In particular, the human knee has bearing surfaces o...
Randy E. Ellis, P. Zion, C. Y. Tso