Sciweavers

5722 search results - page 95 / 1145
» Security Function Interactions
Sort
View
CHI
2005
ACM
14 years 9 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
ACSAC
2009
IEEE
14 years 3 months ago
Semantically Rich Application-Centric Security in Android
—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the...
Machigar Ongtang, Stephen E. McLaughlin, William E...
IWAN
2004
Springer
14 years 2 months ago
Secure, Customizable, Many-to-One Communication
Concast is a customizable many-to-one network-layer communication service. Although programmable services like concast can improve the efficiency of group applications, accompanyi...
Kenneth L. Calvert, Jim Griffioen, Billy Mullins, ...
CCS
2008
ACM
13 years 10 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
CHI
2008
ACM
13 years 10 months ago
Sesame: informing user security decisions with system visualization
Non-expert users face a dilemma when making security decisions. Their security often cannot be fully automated for them, yet they generally lack both the motivation and technical ...
Jennifer Stoll, Craig S. Tashman, W. Keith Edwards...