Sciweavers

258 search results - page 19 / 52
» Portable secure identity management for software engineering
Sort
View
SACMAT
2003
ACM
14 years 1 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
SOUPS
2005
ACM
14 years 2 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
NSPW
2006
ACM
14 years 2 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
RE
2001
Springer
14 years 27 days ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
CSMR
2004
IEEE
14 years 6 days ago
Using Split Objects for Maintenance and Reengineering Tasks
Language integration is an important issue in the area of software maintenance and reengineering. We describe a novel solution in this area: automatically applied and composed spl...
Uwe Zdun