Sciweavers

3792 search results - page 57 / 759
» Techniques for Trusted Software Engineering
Sort
View
EUROSYS
2008
ACM
14 years 7 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
COMPSAC
2006
IEEE
14 years 4 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
UIST
2000
ACM
14 years 2 months ago
The metropolis keyboard - an exploration of quantitative techniques for virtual keyboard design
Text entry user interfaces have been a bottleneck of nontraditional computing devices. One of the promising methods is the virtual keyboard on touch screens. Various layouts have ...
Shumin Zhai, Michael A. Hunter, Barton A. Smith
CCS
2008
ACM
13 years 12 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
CLEIEJ
2004
94views more  CLEIEJ 2004»
13 years 9 months ago
An ontology-based technique for the specification of domain and user models in multi-agent domain
Because of its facilities for the generalization and specialization of concepts and the unambiguous terminology they provide, ontologies are being used for the representation of re...
Rosario Girardi, Carla Gomes de Faria