Sciweavers

1415 search results - page 185 / 283
» Verified systems by composition from verified components
Sort
View
HICSS
2010
IEEE
173views Biometrics» more  HICSS 2010»
14 years 5 months ago
Analysis of Stakeholder/Value Dependency Patterns and Process Implications: A Controlled Experiment
Different classes of information system stakeholders depend on different values to be successful. Understanding stakeholders’ value dependencies is critical for developing softw...
Di Wu, Qi Li, Mei He, Barry W. Boehm, Ye Yang, Sup...
CCS
2006
ACM
14 years 2 months ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith
POPL
2000
ACM
14 years 1 months ago
Resource Bound Certification
Various code certification systems allow the certification and static verification of important safety properties such as memory and control-flow safety. These systems are valuabl...
Karl Crary, Stephanie Weirich
AVBPA
2005
Springer
395views Biometrics» more  AVBPA 2005»
14 years 7 days ago
A Score-Level Fusion Benchmark Database for Biometric Authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Norman Poh, Samy Bengio
SOUPS
2005
ACM
14 years 3 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar