Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-secur...
The National Academy of Science's report on Human-System Integration in the system development process (NAS HSI report) [12] explains how human needs can be integrated into s...
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
: In a design project, the actors cooperate to achieve a same objective, which can be the production of a document, a manufactured product, a plane or a building. The role of a coo...