Sciweavers

274 search results - page 2 / 55
» Security user studies: methodologies and best practices
Sort
View
CHI
2008
ACM
14 years 5 months ago
A user study of policy creation in a flexible access-control system
Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little has been done to evaluate these systems in practic...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
CHI
2009
ACM
13 years 11 months ago
Best practices in longitudinal research
Abstract: Best Practices in Longitudinal Research This workshop will identify best practices for longitudinal research through an in-depth exploration of methods and metrics for c...
Catherine Courage, Jhilmil Jain, Stephanie Rosenba...
ACMDIS
2006
ACM
13 years 11 months ago
Storyboarding: an empirical determination of best practices and effective guidelines
Storyboarding is a common technique in HCI and design for demonstrating system interfaces and contexts of use. Despite its recognized benefits, novice designers still encounter ch...
Khai N. Truong, Gillian R. Hayes, Gregory D. Abowd
ISSA
2004
13 years 6 months ago
A Comparative Study Of Standards And Practices Related To Information Security Management
The need for Information Security in organisations, regardless of their type and size, is being addressed by emerging standards and recommended best practices. The various standar...
Evangelos D. Frangopoulos
COMPSEC
2002
92views more  COMPSEC 2002»
13 years 4 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong