Sciweavers

2236 search results - page 76 / 448
» Secure Software Design in Practice
Sort
View
122
Voted
CCS
2009
ACM
15 years 9 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
131
Voted
ICFEM
2007
Springer
15 years 8 months ago
Formal Engineering of XACML Access Control Policies in VDM++
We present a formal, tool-supported approach to the design and maintenance of access control policies expressed in the eXtensible Access Control Markup Language (XACML). Our aim is...
Jeremy Bryans, John S. Fitzgerald
TC
2010
14 years 9 months ago
Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods
This paper proposes two improved interleaved modular multiplication algorithms based on Barrett and Montgomery modular reduction. The algorithms are simple and especially suitable ...
Miroslav Knezevic, Frederik Vercauteren, Ingrid Ve...
123
Voted
CIVR
2007
Springer
112views Image Analysis» more  CIVR 2007»
15 years 8 months ago
Practice and challenges in trademark image retrieval
In this paper, we outline some of the main challenges facing trademark searchers today, and discuss the extent to which current automated systems are meeting those challenges. Cat...
Jan Schietse, John P. Eakins, Remco C. Veltkamp
129
Voted
ECTEL
2007
Springer
15 years 8 months ago
An Ontology based Web Annotation System to Create New Learning Practices
Web2.0 is a conceptual framework that aims at enhancing the World Wide Web with semantic and social functionnalities. For this framework to fully develop, there is a need for concr...
Christophe Piombo, Hadj Batatia, Pascal Dayre, Ala...