Sciweavers

2429 search results - page 144 / 486
» Using Aspects to Design a Secure System
Sort
View
IJNSEC
2006
77views more  IJNSEC 2006»
13 years 9 months ago
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience
Copyright of e-Education material is valuable. The need for protecting it is prominent. In the past two years, we have developed an infrastructure called e-Course eXchange (eCX ) ...
Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu,...
TOG
2012
181views Communications» more  TOG 2012»
11 years 11 months ago
Guided exploration of physically valid shapes for furniture design
Geometric modeling and the physical validity of shapes are traditionally considered independently. This makes creating aesthetically pleasing yet physically valid models challengi...
Nobuyuki Umetani, Takeo Igarashi, Niloy J. Mitra
SOSP
2007
ACM
14 years 6 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
HASKELL
2006
ACM
14 years 3 months ago
Strongly typed memory areas programming systems-level data structures in a functional language
Modern functional languages offer several attractive features to support development of reliable and secure software. However, in our efforts to use Haskell for systems programmin...
Iavor S. Diatchki, Mark P. Jones
CCS
2009
ACM
14 years 1 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...