Sciweavers

557 search results - page 1 / 112
» Two experiences designing for effective security
Sort
View
SOUPS
2005
ACM
13 years 10 months ago
Two experiences designing for effective security
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
Rogério de Paula, Xianghua Ding, Paul Douri...
CAISE
2009
Springer
13 years 11 months ago
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the S...
Haralambos Mouratidis, Ali Sunyaev, Jan Jürje...
IJNSEC
2006
77views more  IJNSEC 2006»
13 years 4 months ago
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience
Copyright of e-Education material is valuable. The need for protecting it is prominent. In the past two years, we have developed an infrastructure called e-Course eXchange (eCX ) ...
Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu,...
BCSHCI
2007
13 years 6 months ago
Calling time: an effective and affective evaluation of two versions of the MIT Beer Game
Playing a business game needs to be both educational and entertaining. Thus, evaluation of the experience of playing games needs to incorporate both effective and affective dimens...
Nicola Millard, Rosalind Britton
CCS
2004
ACM
13 years 10 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields