Sciweavers

4413 search results - page 688 / 883
» Security for biometric data
Sort
View
SAFECOMP
1999
Springer
15 years 8 months ago
Towards Statistical Control of an Industrial Test Process
We present an ongoing experience aimed at introducing statistical process control techniques to one crucial test phase, namely Function Test, of a real world software development p...
Gaetano Lombardi, Emilia Peciola, Raffaela Mirando...
OOPSLA
1998
Springer
15 years 8 months ago
Visualizing Dynamic Software System Information Through High-Level Models
Dynamic information collected as a software system executes can help software engineers perform some tasks on a system more effectively. To interpret the sizable amount of data ge...
Robert J. Walker, Gail C. Murphy, Bjørn N. ...
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
15 years 8 months ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
15 years 8 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 8 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...