Sciweavers

4731 search results - page 176 / 947
» Securing Interactive Programs
Sort
View
OOPSLA
2005
Springer
14 years 3 months ago
An interactive visualization of refactorings retrieved from software archives
We perform knowledge discovery in software archives in order to detect refactorings on the level of classes and methods. Our REFVIS prototype finds these refactorings in CVS repo...
Peter Weißgerber, Stephan Diehl, Carsten G&o...
RAID
2005
Springer
14 years 3 months ago
Interactive Visualization for Network and Port Scan Detection
Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connect...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
SOUPS
2006
ACM
14 years 4 months ago
Seeing further: extending visualization as a basis for usable security
The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of thei...
Jennifer Ann Rode, Carolina Johansson, Paul DiGioi...
SAC
2005
ACM
14 years 3 months ago
Scalable security and accounting services for content-based publish/subscribe systems
Content-based publish/subscribe systems offer an interaction scheme that is appropriate for a variety of large scale dynamic applications. However, widespread use of these systems...
Himanshu Khurana
ASIACRYPT
2005
Springer
14 years 3 months ago
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
We propose Gate Evaluation Secret Sharing (GESS) – a new kind of secret sharing, designed for use in secure function evaluation (SFE) with minimal interaction. The resulting simp...
Vladimir Kolesnikov