Sciweavers

12478 search results - page 55 / 2496
» Secure Interaction Design
Sort
View
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 8 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
OOPSLA
2007
Springer
15 years 8 months ago
Collaboration and telecollaboration in design
Frederick P. Brooks Jr.
124
Voted
AGENTS
2001
Springer
15 years 7 months ago
Improving the agent-oriented modeling process by roles
The agent-oriented modeling process is divided in a typical sequence of activities, i.e., requirements specification, analysis, and design. The requirements are specified by des...
Ralph Depke, Reiko Heckel, Jochen Malte Küste...
ICWS
2007
IEEE
15 years 3 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
CHI
2007
ACM
16 years 2 months ago
Security user studies: methodologies and best practices
Serge Egelman, Jennifer King, Robert C. Miller, Ni...