Sciweavers

591 search results - page 19 / 119
» Securing the Broker Pattern
Sort
View
ICB
2007
Springer
135views Biometrics» more  ICB 2007»
14 years 2 months ago
Feeling Is Believing: A Secure Template Exchange Protocol
We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol ...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
COMPSAC
2006
IEEE
14 years 2 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
JAVA
1999
Springer
14 years 26 days ago
The Gateway System: Uniform Web Based Access to Remote Resources
Exploiting our experience developing the WebFlow system, we designed the Gateway system to provide seamless and secure access to computational resources at ASC MSRC. The Gateway f...
Geoffrey Fox, Tomasz Haupt, Erol Akarsu, Alexey Ka...
BIOCOMP
2009
13 years 9 months ago
Monitoring Influenza Trends through Mining Social Media
Analysis of Google Influenza-like-illness (ILI) search queries has shown a strongly correlated pattern with Center for Disease Control and Prevention seasonal ILI reporting data. W...
Courtney Corley, Armin R. Mikler, Karan P. Singh, ...
OOPSLA
1997
Springer
14 years 22 days ago
Composite Design Patterns
ed Abstract Factory is yet another. When patterns cooperate, the cooperation itself can give rise to problems, contexts, trade-offs, and consequences. For instance, should a Visito...
Dirk Riehle