Sciweavers

220 search results - page 35 / 44
» Authoring Issues beyond Tools
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
NORDICHI
2004
ACM
14 years 1 months ago
Survey on the UCD integration in the industry
The primary contribution of this paper is investigating how the User Centered Design approach is integrated into the industry. Employing a structured web-survey, targeted to the u...
Giorgio Venturi, Jimmy Troost
MM
2003
ACM
135views Multimedia» more  MM 2003»
14 years 1 months ago
Detail-on-demand hypervideo
We demonstrate the use of detail-on-demand hypervideo in interactive training and video summarization. Detail-on-demand video allows viewers to watch short video segments and to f...
John Doherty, Andreas Girgensohn, Jonathan Helfman...
ACSAC
1998
IEEE
14 years 24 days ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
MM
1998
ACM
63views Multimedia» more  MM 1998»
14 years 22 days ago
Structural Distinctions Between Hypermedia Storage and Presentation
In order to facilitate adaptability of hypermedia documents a distinction is often made between the underlying conceptual structure of a document and the structure of its presenta...
Lloyd Rutledge, Lynda Hardman, Jacco van Ossenbrug...