Sciweavers

573 search results - page 29 / 115
» Scenarios in System Development: Current Practice
Sort
View
EUROPKI
2009
Springer
13 years 7 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
INTERACT
2003
13 years 11 months ago
Usability Heuristics for Large Screen Information Exhibits
: This paper reports on current development of usability heuristics for large screen information exhibits. By basing the creation of such heuristics on real systems, and identifyin...
Jacob P. Somervell, Shahtab Wahid
LOCA
2005
Springer
14 years 3 months ago
Towards LuxTrace: Using Solar Cells to Measure Distance Indoors
Abstract. Navigation for and tracking of humans within a building usually implies significant infrastructure investment and devices are usually too high in weight and volume to be...
Julian Randall, Oliver Amft, Gerhard Tröster
ENTCS
2007
121views more  ENTCS 2007»
13 years 9 months ago
Audit-Based Access Control for Electronic Health Records
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the secu...
M. A. C. Dekker, Sandro Etalle
TAP
2008
Springer
144views Hardware» more  TAP 2008»
13 years 9 months ago
Integrating Verification and Testing of Object-Oriented Software
Formal methods can only gain widespread use in industrial software development if they are integrated into software development techniques, tools, and languages used in practice. A...
Christian Engel, Christoph Gladisch, Vladimir Kleb...