Sciweavers

135 search results - page 11 / 27
» Sesame: informing user security decisions with system visual...
Sort
View
AVI
2008
13 years 9 months ago
An empirical evaluation of interactive visualizations for preferential choice
Many critical decisions for individuals and organizations are often framed as preferential choices: the process of selecting the best option out of a set of alternatives. This pap...
Jeanette Bautista, Giuseppe Carenini
MHCI
2009
Springer
14 years 1 months ago
User evaluation of lightweight user authentication with a single tri-axis accelerometer
We report a series of user studies that evaluate the feasibility and usability of light-weight user authentication with a single tri-axis accelerometer. We base our investigation ...
Jiayang Liu, Lin Zhong, Jehan Wickramasuriya, Venu...
CASSIS
2005
Springer
14 years 8 days ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
SISW
2005
IEEE
14 years 9 days ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...
CCS
2008
ACM
13 years 8 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...