Sciweavers

21 search results - page 2 / 5
» Visualizing Enterprise-Wide Security (VIEWS)
Sort
View
CHI
2008
ACM
14 years 5 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
VIZSEC
2005
Springer
13 years 10 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
ISI
2006
Springer
13 years 5 months ago
Analyzing the Terrorist Social Networks with Visualization Tools
Analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Such knowledge is important for developing effective co...
Christopher C. Yang, Nan Liu, Marc Sageman
ESORICS
2009
Springer
14 years 1 days ago
Visualizing Privacy Implications of Access Control Policies in Social Network Systems
Wehypothesizethat, inaFacebook-stylesocial networksystem, proper visualization of one’s extended neighbourhood could help the user understand the privacy implications of her acce...
Mohd M. Anwar, Philip W. L. Fong, Xue-Dong Yang, H...
EAGC
2003
Springer
13 years 10 months ago
Automatic Services Discovery, Monitoring and Visualization of Grid Environments: The MapCenter Approach
The complexity of Grid environments is growing as more projects and applications appear in this quick-evolving domain. Widespread applications are distributed over thousands of com...
Franck Bonnassieux, Robert Harakaly, Pascale Prime...