Sciweavers

8 search results - page 2 / 2
» Social navigation as a model for usable security
Sort
View
SOUPS
2005
ACM
13 years 10 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
WWW
2009
ACM
14 years 6 months ago
Web 2.0: blind to an accessible new world
With the advent of Web 2.0 technologies, websites have evolved from static pages to dynamic, interactive Web-based applications with the ability to replicate common desktop functi...
Joshua M. Hailpern, Loretta Guarino Reid, Richard ...
IEEEARES
2007
IEEE
13 years 11 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer