Sciweavers

1116 search results - page 17 / 224
» Secure Mediation: Requirements and Design
Sort
View
SOUPS
2010
ACM
14 years 29 days ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
IS
2007
13 years 9 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
14 years 3 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
SASO
2008
IEEE
14 years 3 months ago
The Meaning of Semiochemicals to the Design of Self-Organizing Systems
In biology, many organisms coordinate their interactions in a self-organizing and emergent way solely by means of indirect communication based on chemical substances. These so-cal...
Holger Kasinger, Bernhard Bauer, Jörg Denzing...
HICSS
2007
IEEE
170views Biometrics» more  HICSS 2007»
14 years 3 months ago
Articulation Work Supporting Information Infrastructure Design: Coordination, Categorization, and Assessment in Practice
Articulation work is a critical factor in information infrastructure building projects that involve multiple and diverse communities. It brings awareness of language differences, ...
Karen S. Baker, Florence Millerand