Sciweavers

401 search results - page 2 / 81
» Security and User Guidelines for the Design of the Future Ne...
Sort
View
IMCS
2007
78views more  IMCS 2007»
13 years 5 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
SAICSIT
2009
ACM
13 years 11 months ago
A lightweight methodology to improve web accessibility
This paper introduces a methodology to improve the accessibility of websites with the use of free so-called automatic tools. The methodology has three iterative phases, namely ass...
Mardé Greeff, Paula Kotzé
APNOMS
2009
Springer
13 years 11 months ago
The Design of an Autonomic Communication Element to Manage Future Internet Services
Future Internet services will have vastly different requirements than the current Internet. Manageability, which has been largely ignored, will have the dual role of controlling ca...
John Strassner, Sung-Su Kim, James Won-Ki Hong
VIZSEC
2005
Springer
13 years 10 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
SISW
2005
IEEE
13 years 10 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok