Sciweavers

135 search results - page 5 / 27
» Sesame: informing user security decisions with system visual...
Sort
View
GLOBECOM
2010
IEEE
13 years 4 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
VIZSEC
2004
Springer
14 years 1 days ago
PortVis: a tool for port-based detection of security events
Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, To...
AVI
2000
13 years 8 months ago
Guidelines for Using Multiple Views in Information Visualization
A multiple view system uses two or more distinct views to support the investigation of a single conceptual entity. Many such systems exist, ranging from computer-aided design (CAD...
Michelle Q. Wang Baldonado, Allison Woodruff, Alla...
UIALL
2004
Springer
14 years 1 days ago
A New Visualization Concept for Navigation Systems
At present, various types of car navigation systems are progressively entering the market. Simultaneously, mobile outdoor navigation systems for pedestrians and electronic tourist ...
Wolfgang Narzt, Gustav Pomberger, Alois Ferscha, D...
SOUPS
2009
ACM
14 years 1 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...