Sciweavers

1875 search results - page 298 / 375
» Modeling the Security of Steganographic Systems
Sort
View
ECOOP
2009
Springer
14 years 10 months ago
Fine-Grained Access Control with Object-Sensitive Roles
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does ...
Jeffrey Fischer, Daniel Marino, Rupak Majumdar, To...
OSDI
2008
ACM
14 years 10 months ago
Leveraging Legacy Code to Deploy Desktop Applications on the Web
Xax is a browser plugin model that enables developers to leverage existing tools, libraries, and entire programs to deliver feature-rich applications on the web. Xax employs a nov...
John R. Douceur, Jeremy Elson, Jon Howell, Jacob R...
ICSE
1999
IEEE-ACM
14 years 2 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
DBSEC
2006
134views Database» more  DBSEC 2006»
13 years 11 months ago
Notarized Federated Identity Management for Web Services
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary servi...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
ICIP
1998
IEEE
14 years 11 months ago
Hardware Architecture for Optical Flow Estimation in Real Time
Optical flow estimation from image sequences has been for several years a mathematical process carried out by general purpose processors in no real time. In this work a specific a...
Aitzol Zuloaga, José Luis Martín, Jo...