Sciweavers

349 search results - page 25 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
SACMAT
2010
ACM
13 years 8 months ago
On the definition of role mining
There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem....
Mario Frank, Joachim M. Buhmann, David A. Basin
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 1 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
14 years 9 days ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
CHI
2007
ACM
14 years 9 months ago
Pictures at the ATM: exploring the usability of multiple graphical passwords
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs) via an authentication process involving a Personal Identification Number (PIN)...
Wendy Moncur, Grégory Leplâtre
ACMDIS
1997
ACM
14 years 24 days ago
HCI, Natural Science and Design: A Framework for Triangulation Across Disciplines
Human-computer interaction is multidisciplinary, drawing paradigms and techniques from both the natural sciences and the design disciplines. HCI cannot be considered a pure natura...
Wendy E. Mackay, Anne-Laure Fayard