Sciweavers

274 search results - page 7 / 55
» Security user studies: methodologies and best practices
Sort
View
QSIC
2007
IEEE
14 years 1 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao
SOUPS
2006
ACM
14 years 1 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
HCI
2007
13 years 8 months ago
Tools to Increase the Strategic Value of User Experience Design
Case study describing tools and processes enabling accelerated adoption of Usability Standards, and increased efficiencies in development of accessible, internationalized, branded...
James E. Nieters, David Grabel, Vijay Agrawal
RE
1997
Springer
13 years 11 months ago
SOFL: A Formal Engineering Methodology for Industrial Applications
—Formal methods have yet to achieve wide industrial acceptance for several reasons. They are not well integrated into hed industrial software processes, their application require...
Shaoying Liu
SIGIR
2011
ACM
12 years 10 months ago
ViewSer: enabling large-scale remote user studies of web search examination and interaction
Web search behaviour studies, including eye-tracking studies of search result examination, have resulted in numerous insights to improve search result quality and presentation. Ye...
Dmitry Lagun, Eugene Agichtein