Sciweavers

164 search results - page 5 / 33
» A Case (Study) For Usability in Secure Email Communication
Sort
View
CHI
2007
ACM
14 years 8 months ago
Defining high-throughput email users
In this paper we make the case for the existence and importance of a special class of email user, the highthroughput email user, whose needs are not wellserved by current clients....
Joshua B. Gross
EUROSYS
2006
ACM
14 years 4 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
HUC
2010
Springer
13 years 8 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 11 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
INTERACT
2003
13 years 9 months ago
Messaging And Formality: Will IM Follow in the Footsteps of Email?
: One virtue of instant messaging is informality. As messaging is used more in work settings, being able to consult an exchange later can be beneficial. However, archived communica...
Tracey Lovejoy, Jonathan Grudin