Sciweavers

4731 search results - page 162 / 947
» Securing Interactive Programs
Sort
View
ISI
2008
Springer
13 years 9 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
MP
2010
132views more  MP 2010»
13 years 3 months ago
Exploiting group symmetry in semidefinite programming relaxations of the quadratic assignment problem
We consider semidefinite programming relaxations of the quadratic assignment problem, and show how to exploit group symmetry in the problem data. Thus we are able to compute the b...
Etienne de Klerk, Renata Sotirov
USS
2008
13 years 11 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
JDCTA
2008
138views more  JDCTA 2008»
13 years 7 months ago
DVRC-iTV: Download Variable Remote Control for Interactive TV
TV is one of the most important home appliances and the remote controller is a crucial TV input device. TV remote controllers have always been designed with TV compatibility in mi...
Shu-Ching Wang, Tzu-Chih Chung, Kuo-Qin Yan
IJSSE
2011
127views more  IJSSE 2011»
13 years 4 months ago
A Formal Language for XML Authorisations Based on Answer Set Programming and Temporal Interval Logic Constraints
The Extensible Markup Language is susceptible to security breaches because it does not incorporate methods to protect the information it encodes. Our work presented in this paper f...
Sean Policarpio, Yan Zhang