Sciweavers

3792 search results - page 57 / 759
» Techniques for Trusted Software Engineering
Sort
View
141
Voted
EUROSYS
2008
ACM
16 years 18 days ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
COMPSAC
2006
IEEE
15 years 9 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
113
Voted
UIST
2000
ACM
15 years 8 months ago
The metropolis keyboard - an exploration of quantitative techniques for virtual keyboard design
Text entry user interfaces have been a bottleneck of nontraditional computing devices. One of the promising methods is the virtual keyboard on touch screens. Various layouts have ...
Shumin Zhai, Michael A. Hunter, Barton A. Smith
CCS
2008
ACM
15 years 5 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
111
Voted
CLEIEJ
2004
94views more  CLEIEJ 2004»
15 years 3 months ago
An ontology-based technique for the specification of domain and user models in multi-agent domain
Because of its facilities for the generalization and specialization of concepts and the unambiguous terminology they provide, ontologies are being used for the representation of re...
Rosario Girardi, Carla Gomes de Faria