Sciweavers

2429 search results - page 66 / 486
» Using Aspects to Design a Secure System
Sort
View
JUCS
2008
141views more  JUCS 2008»
13 years 9 months ago
Designing Collaborative User Interfaces for Ubiquitous Applications Using CIAM: The AULA Case Study
: In this article we explain how we apply the CIAM methodology based on the CIAN notation in order to generate user interfaces in collaborative applications. CIAM has been applied ...
Maximiliano Paredes, Ana I. Molina, Miguel A. Redo...
ICISS
2007
Springer
14 years 3 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
EDOC
2003
IEEE
14 years 2 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...
ICDCS
1998
IEEE
14 years 1 months ago
Experience with Secure Multi-Processing in Java
As Java is the preferred platform for the deployment of network computers, it is appealing to run multiple applications on a single Java desktop. We experimented with using the Ja...
Dirk Balfanz, Li Gong
CSFW
2004
IEEE
14 years 22 days ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong