Sciweavers

234 search results - page 14 / 47
» Usable security and privacy: a case study of developing priv...
Sort
View
CRITIS
2007
13 years 9 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
OOPSLA
2007
Springer
14 years 1 months ago
CASE-FX: feature modeling support in an OO Case tool
Generative Programming advocates developing a family of systems rather than a set of single systems. Feature modeling can assist in supporting the development of such software pro...
Alain Forget, Dave Arnold, Sonia Chiasson
DIM
2005
ACM
13 years 9 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
RE
2001
Springer
14 years 3 days ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
WPES
2005
ACM
14 years 1 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...