Sciweavers

198 search results - page 7 / 40
» Describing Secure Interfaces with Interface Automata
Sort
View
ACSAC
2005
IEEE
14 years 4 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth
CHI
2008
ACM
14 years 11 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
ISCC
2005
IEEE
14 years 4 months ago
Virtual Machine Management for Tele-Lab "IT-Security" Server
Tele-Lab “IT-Security” Server is a new concept for practical security education. The Tele-lab server builds a virtual security laboratory using lightweight virtual machines an...
Ji Hu, Dirk Cordel, Christoph Meinel
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 11 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
SP
2002
IEEE
122views Security Privacy» more  SP 2002»
13 years 10 months ago
The UNICORE Grid infrastructure
UNICORE (Uniform Interface to Computer Resources) is a software infrastructure supporting seamless and secure access to distributed resources. UNICORE allows uniform access to dif...
Mathilde Romberg