Sciweavers

16843 search results - page 38 / 3369
» On Generalized Authorization Problems
Sort
View
CHI
2008
ACM
14 years 8 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
NDSS
2008
IEEE
14 years 2 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...
ICDM
2007
IEEE
182views Data Mining» more  ICDM 2007»
14 years 2 months ago
Co-ranking Authors and Documents in a Heterogeneous Network
The problem of evaluating scientific publications and their authors is important, and as such has attracted increasing attention. Recent graph-theoretic ranking approaches have d...
Ding Zhou, Sergey A. Orshanskiy, Hongyuan Zha, C. ...
AIIDE
2008
13 years 10 months ago
An Intelligent IDE for Behavior Authoring in Real-Time Strategy Games
Behavior authoring for computer games involves writing behaviors in a programming language and then iteratively refining them by detecting issues with them. The main bottlenecks a...
Suhas Virmani, Yatin Kanetkar, Manish Mehta, Santi...
DEXAW
2010
IEEE
172views Database» more  DEXAW 2010»
13 years 9 months ago
Distributed Semantic Video Tagging for Peer-to-Peer Authoring System
Abstract--In the context of a project aimed at the development of a cooperative and distributed Authoring System to facilitate the production, sharing, and integration of new and e...
Giuseppe Rizzo, Biagio Meirone, Pierluigi Di Nunzi...