In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the S...
Copyright of e-Education material is valuable. The need for protecting it is prominent. In the past two years, we have developed an infrastructure called e-Course eXchange (eCX ) ...
Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu,...
Playing a business game needs to be both educational and entertaining. Thus, evaluation of the experience of playing games needs to incorporate both effective and affective dimens...
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...