Sciweavers

1949 search results - page 22 / 390
» Protective Interface Specifications
Sort
View
ACSAC
2000
IEEE
13 years 12 months ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger
ACSAC
2002
IEEE
14 years 15 days ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
EATIS
2007
ACM
13 years 11 months ago
Protection of technological measures: juridical definition of a technical tool
The present work aims to bring to discussion and to analysis, the texts of the 6th article of the 2001/29/EC Directive (22nd of May) and the 217th article of the Portuguese law 50...
Lígia Lopes de Sousa Carreto
INFOCOM
2010
IEEE
13 years 4 months ago
On the Feasibility and Efficacy of Protection Routing in IP Networks
With network components increasingly reliable, routing is playing an ever greater role in determining network reliability. This has spurred much activity in improving routing stabi...
Kin Wah Kwong, Lixin Gao, Roch Guérin, Zhi-...
ASE
2006
161views more  ASE 2006»
13 years 7 months ago
Automated Prototyping of User Interfaces Based on UML Scenarios
User interface (UI) prototyping and scenario engineering have become popular techniques. Yet, the transition from scenario to formal specifications and the generation of UI code is...
Mohammed Elkoutbi, Ismaïl Khriss, Rudolf K. K...