Sciweavers

1407 search results - page 36 / 282
» Systems Theory Model for Information Security
Sort
View
MODELLIERUNG
2008
13 years 9 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
ICISS
2007
Springer
14 years 2 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
ATAL
2010
Springer
13 years 9 months ago
Model checking detectability of attacks in multiagent systems
Information security is vital to many multiagent system applications. In this paper we formalise the notion of detectability of attacks in a MAS setting and analyse its applicabil...
Ioana Boureanu, Mika Cohen, Alessio Lomuscio
CE
2005
60views more  CE 2005»
13 years 7 months ago
Personalized e-learning system using Item Response Theory
Personalized service is important on the Internet, especially in Web-based learning. Generally, most personalized systems consider learner preferences, interests, and browsing beh...
Chih-Ming Chen, Hahn-Ming Lee, Ya-Hui Chen
CHI
2010
ACM
14 years 2 months ago
Multi-lifespan information system design: a research initiative for the hci community
This CHI Note proposes a new research initiative for the HCI community: multi-lifespan information system design. The central idea begins with the identification of categories of ...
Batya Friedman, Lisa P. Nathan