Sciweavers

471 search results - page 10 / 95
» Social applications: exploring a more secure framework
Sort
View
HICSS
2009
IEEE
124views Biometrics» more  HICSS 2009»
14 years 2 months ago
Case Studies of an Insider Framework
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
PET
2010
Springer
13 years 11 months ago
How to Share Your Favourite Search Results while Preserving Privacy and Quality
Personalised social search is a promising avenue to increase the relevance of search engine results by making use of recommendations made by friends in a social network. More gener...
George Danezis, Tuomas Aura, Shuo Chen, Emre Kicim...
ASWEC
2004
IEEE
13 years 11 months ago
A Process Framework for Characterising Security Properties of Component-Based Software Systems
This paper presents a security characterisation process framework for software components and their compositions in order to address the issue of trust in component based software...
Khaled M. Khan, Jun Han
CSCW
2011
ACM
13 years 2 months ago
Faceted identity, faceted lives: social and technical issues with being yourself online
This paper explores key issues people experience managing personal boundaries within and across social technologies. We look in particular at email and online social networks. We ...
Shelly Farnham, Elizabeth F. Churchill
CHI
2009
ACM
14 years 8 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle