Sciweavers

2429 search results - page 181 / 486
» Using Aspects to Design a Secure System
Sort
View
102
Voted
ICRE
1996
IEEE
15 years 6 months ago
A facilitator method for upstream design activities with diverse stakeholders
This paper presents a method that can be used for the elicitation and speci cation of requirements and high-level design. It supports stakeholder-based modeling, rapid feasibility...
Regina M. Gonzales, Alexander L. Wolf
EUROSEC
2009
ACM
15 years 9 months ago
Secure 3D graphics for virtual machines
In this paper a new approach to API remoting for GPU virtualisation is described which aims to reduce the amount of trusted code involved in 3D rendering for guest VMs. To achieve...
Christopher Smowton
101
Voted
ACSAC
2004
IEEE
15 years 6 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
93
Voted
ICMCS
2007
IEEE
153views Multimedia» more  ICMCS 2007»
15 years 8 months ago
Towards Adversary Aware Surveillance Systems
We consider surveillance problems to be a set of system- adversary interaction problems in which an adversary can be modeled as a rational (selfish) agent trying to maximize his ...
Vivek K. Singh, Mohan S. Kankanhalli
IJAHUC
2007
90views more  IJAHUC 2007»
15 years 2 months ago
A survey on context-aware systems
: Context-aware systems offer entirely new opportunities for application developers and for end users by gathering context data and adapting systems behaviour accordingly. Especial...
Matthias Baldauf, Schahram Dustdar, Florian Rosenb...