Sciweavers

1288 search results - page 171 / 258
» Securing aspect composition
Sort
View
SP
2005
IEEE
183views Security Privacy» more  SP 2005»
14 years 4 months ago
A Generic Attack on Checksumming-Based Software Tamper Resistance
Self-checking software tamper resistance mechanisms employing checksums, including advanced systems as recently proposed by Chang and Atallah (2002) and Horne et al. (2002), have ...
Glenn Wurster, Paul C. van Oorschot, Anil Somayaji
SIGCSE
2005
ACM
108views Education» more  SIGCSE 2005»
14 years 4 months ago
Teaching and learning ethics in computer science: walking the walk
The author shares techniques used in a successful "Ethics and Professionalism" class at California State University, San Bernardino. The author describes active learning...
Richard J. Botting
UIALL
2004
Springer
14 years 4 months ago
Adaptive User Modelling in AthosMail
In this paper we discuss the adaptive User Model component of the AthosMail system, and describe especially the Cooperativity Model which produces recommendations for the appropria...
Kristiina Jokinen, Kari Kanto, Jyrki Rissanen
ICDAR
2003
IEEE
14 years 4 months ago
Document Identity, Authentication and Ownership: The Future of Biometric Verification
Document security is an increasingly important element in the multi-faceted discipline of document processing, and authentication of individual identity will play an increasingly ...
Michael C. Fairhurst
CSFW
2002
IEEE
14 years 3 months ago
A Formal Analysis of Some Properties of Kerberos 5 Using MSR
We formalize aspects of the Kerberos 5 authentication protocol in the Multi-Set Rewriting formalism (MSR) on two levels of detail. The more detailed formalization reflects the in...
Frederick Butler, Iliano Cervesato, Aaron D. Jagga...