Sciweavers

274 search results - page 1 / 55
» Security user studies: methodologies and best practices
Sort
View
CHI
2007
ACM
14 years 4 months ago
Security user studies: methodologies and best practices
Serge Egelman, Jennifer King, Robert C. Miller, Ni...
SOUPS
2010
ACM
13 years 8 months ago
Do windows users follow the principle of least privilege?: investigating user account control practices
The principle of least privilege requires that users and their programs be granted the most restrictive set of privileges possible to perform required tasks in order to limit the ...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
ICWS
2004
IEEE
13 years 5 months ago
Best-Practice Patterns and Tool Support for Configuring Secure Web Services Messaging
This paper presents an emerging tool for security configuration of service-oriented architectures with Web Services. Security is a major concern when implementing mission-critical...
Michiaki Tatsubori, Takeshi Imamura, Yuhichi Nakam...
CIIT
2004
132views Communications» more  CIIT 2004»
13 years 5 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
VISUALIZATION
2002
IEEE
13 years 9 months ago
Case Study: Interactive Visualization for Internet Security
Internet connectivity is defined by a set of routing protocols which let the routers that comprise the Internet backbone choose the best route for a packet to reach its destinati...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Xia...