Sciweavers

5722 search results - page 68 / 1145
» Security Function Interactions
Sort
View
HICSS
1999
IEEE
88views Biometrics» more  HICSS 1999»
14 years 1 months ago
Facilitating User-System Interaction: The GAIA Interaction Agent
This paper presents the identification, design and implementation of a user interface to a brokerage system and the conceptual architecture and functional behaviour of an intellig...
Panayiotis Koutsabasis, John Darzentas, Thomas Spy...
INTERACT
2007
13 years 10 months ago
Designing a Trade-Off Between Usability and Security: A Metrics Based-Model
The design of usable yet secure systems raises crucial questions when it comes to balancing properly security and usability. Finding the right tradeoff between these two quality at...
Christina Braz, Ahmed Seffah, David M'Raïhi
SEDE
2010
13 years 6 months ago
Security Controls Applied to Web Service Architectures
Security certification assesses the security posture of a software system to verify its compliance with diverse, pre-specified security controls identified by guidelines from NIST...
Robert Baird, Rose F. Gamble
SASO
2007
IEEE
14 years 3 months ago
Adaptive SSL: Design, Implementation and Overhead Analysis
Adaptive security is based on the observation that the security requirements of a system or service heavily depend on the environment in which they operate and should therefore be...
Christiaan J. Lamprecht, Aad P. A. van Moorsel
CHI
2009
ACM
14 years 9 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle