Sciweavers

12478 search results - page 65 / 2496
» Secure Interaction Design
Sort
View
AINA
2003
IEEE
15 years 7 months ago
Design, Implementation and Performance Evaluation of IP-VPN
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a netwo...
Jin-Cherng Lin, Ching-Tien Chang, Wei-Tao Chung
CHI
2011
ACM
14 years 6 months ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi
115
Voted
CCECE
2006
IEEE
15 years 8 months ago
Security Design Patterns: Survey and Evaluation
Security design patterns have been proposed recently as a tool for the improvement of software security during the architecture and design phases. Since the apperance of this rese...
Marc-André Laverdière, Azzam Mourad,...
SEKE
2004
Springer
15 years 8 months ago
Integrating Security Administration into Software Architectures Design
Software architecture plays a central role in developing software systems that satisfy functionality and security requirements. However, little has been done to integrate system d...
Huiqun Yu, Xudong He, Yi Deng, Lian Mo
130
Voted
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
15 years 9 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...