Sciweavers

12478 search results - page 13 / 2496
» Secure Interaction Design
Sort
View
OOPSLA
1999
Springer
13 years 11 months ago
Subject-Oriented Design: Towards Improved Alignment of Requirements, Design, and Code
Siobhán Clarke, William H. Harrison, Harold...
INTERACT
2003
13 years 8 months ago
Managing Multiple Passwords and Multiple Logins: MiFA
Internet users today who subscribe to many different accounts or subscriptions online face a bewildering array of logins and passwords to remember on security systems where usabil...
Bo Lu, Michael Twidale
INTERACTIONS
2006
50views more  INTERACTIONS 2006»
13 years 7 months ago
IT security: protecting organizations in spite of themselves
David A. Siegel, Bill Reid, Susan M. Dray
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 4 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
ISI
2004
Springer
14 years 23 days ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia