Sciweavers

379 search results - page 45 / 76
» Usability testing: what have we overlooked
Sort
View
COMPSAC
2007
IEEE
13 years 11 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
VL
2010
IEEE
160views Visual Languages» more  VL 2010»
13 years 6 months ago
Toward End-User Debugging of Machine-Learned Classifiers
Many machine-learning algorithms learn rules of behavior from individual end users, such as taskoriented desktop organizers and handwriting recognizers. These rules form a generat...
Todd Kulesza
IWSSD
2000
IEEE
14 years 18 hour ago
Model Checking Implicit-Invocation Systems
While implicit invocation (publish-subscribe) systems have goodengineering properties, they are difficult toreason about and to test. Model checking such systems is an attractive...
David Garlan, Serge Khersonsky
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
14 years 1 months ago
Evaluation of Biometric Identification in Open Systems
This paper concerns the generalizability of biometric identification results from small-sized closed systems to larger open systems. Many researchers have claimed high identificati...
Michael Gibbons, Sungsoo Yoon, Sung-Hyuk Cha, Char...
SP
2005
IEEE
188views Security Privacy» more  SP 2005»
14 years 1 months ago
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
In this paper, we propose BIND (Binding Instructions aNd Data),1 a fine-grained attestation service for securing distributed systems. Code attestation has recently received consi...
Elaine Shi, Adrian Perrig, Leendert van Doorn