Sciweavers

1627 search results - page 119 / 326
» On context in authorization policy
Sort
View
ESSOS
2010
Springer
14 years 7 months ago
Automatic Generation of Smart, Security-Aware GUI Models
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...
IJISEC
2006
113views more  IJISEC 2006»
13 years 10 months ago
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing , there has been a great deal of interest in cryptographic primitiv...
Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Sma...
CSCW
2011
ACM
13 years 5 months ago
Research team integration: what it is and why it matters
Science policy across the world emphasizes the desirability of research teams that can integrate diverse perspectives and expertise into new knowledge, methods, and products. Howe...
Aruna D. Balakrishnan, Sara B. Kiesler, Jonathon N...
CHI
2011
ACM
13 years 2 months ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 4 months ago
Creating a Scenariologic - Design and Application of a Repeatable Methodology
Context scenarios are widely used for assessing the robustness of strategies and policies in both the private and the public sector. Royal Dutch Shell, for instance, has become re...
Bert Enserink