Sciweavers

2270 search results - page 236 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
CGF
2006
196views more  CGF 2006»
15 years 4 months ago
Physically Based Deformable Models in Computer Graphics
Physically based deformable models have been widely embraced by the Computer Graphics community. Many problems outlined in a previous survey by Gibson and Mirtich [GM97] have been...
Andrew Nealen, Matthias Müller, Richard Keise...
DRM
2004
Springer
15 years 10 months ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 9 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
IEEEARES
2006
IEEE
15 years 10 months ago
Diagnosis of Complex Systems Using Ant Colony Decision Petri Nets
Failure diagnosis in large and complex systems is a critical task. A discrete event system (DES) approach to the problem of failure diagnosis is presented in this paper. A classic...
Calin Ciufudean, Adrian Graur, Constantin Filote, ...
SAC
2000
ACM
15 years 9 months ago
Making Tuple Spaces Safe for Heterogeneous Distributed Systems
Linda is a high level communication model which allows agents to communicate via a shared tuple spaces without knowing each other’s identities and without having to arrange for ...
Naftaly H. Minsky, Yaron Minsky, Victoria Ungurean...