Sciweavers

2270 search results - page 73 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
HCSE
2010
13 years 6 months ago
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats end...
Shamal Faily, Ivan Flechais
IAT
2009
IEEE
14 years 3 months ago
Agent-Based Security System for User Verification
—We present a security system consisting of an arbitrary number of entries, sensors and agents. The intelligent integrated system is based on user modeling, i.e. models of their ...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
SQJ
2008
116views more  SQJ 2008»
13 years 8 months ago
E-commerce system quality assessment using a model based on ISO 9126 and Belief Networks
: As business transitions into the new economy, e-system successful use has become a strategic goal. Especially in business to consumer (e-commerce) applications, users highly eval...
Antonia Stefani, Michalis Nik Xenos
ATAL
2011
Springer
12 years 8 months ago
AgentC: agent-based system for securing maritime transit
Recent rise in maritime piracy prompts the search for novel techniques for addressing the problem. We therefore developed AgentC, a prototype system that demonstrates how agent-ba...
Michal Jakob, Ondrej Vanek, Branislav Bosansk&yacu...
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
14 years 2 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru