Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
Personalised social search is a promising avenue to increase the relevance of search engine results by making use of recommendations made by friends in a social network. More gener...
George Danezis, Tuomas Aura, Shuo Chen, Emre Kicim...
This paper presents a security characterisation process framework for software components and their compositions in order to address the issue of trust in component based software...
This paper explores key issues people experience managing personal boundaries within and across social technologies. We look in particular at email and online social networks. We ...
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...