Sciweavers

4731 search results - page 175 / 947
» Securing Interactive Programs
Sort
View
CSE
2009
IEEE
14 years 2 months ago
A Unified Approach to Intra-domain Security
While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to sec...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
ICEBE
2007
IEEE
151views Business» more  ICEBE 2007»
14 years 4 months ago
Systematic Security Analysis for Service-Oriented Software Architectures
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
Yanguo Liu, Issa Traoré
DEXAW
2009
IEEE
102views Database» more  DEXAW 2009»
14 years 2 months ago
A Pattern for Secure Graphical User Interface Systems
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
CHI
2007
ACM
14 years 10 months ago
The impact of digital iconic realism on anonymous interactants' mobile phone communication
In this paper, I describe progress in research designed to explore the effect of the combination of behavioral and visual fidelity of avatars on users' social presence in syn...
Sin-Hwa Kang
ISI
2004
Springer
14 years 3 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia