Sciweavers

IEEEARES
2010
IEEE
13 years 11 months ago
Security and Usability: Analysis and Evaluation
Abstract—The differences between the fields of HumanComputer Interaction and Security (HCISec) and HumanComputer Interaction (HCI) have not been investigated very closely. Many ...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
IEEEARES
2010
IEEE
13 years 11 months ago
External Insider Threat: A Real Security Challenge in Enterprise Value Webs
—Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As ...
Virginia N. L. Franqueira, André van Cleeff...
IEEEARES
2010
IEEE
13 years 11 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
IEEEARES
2010
IEEE
13 years 11 months ago
Analysing and Visualising Security and Usability in IRIS
Abstract—Despite a long standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a ...
Shamal Faily, Ivan Flechais
IEEEARES
2010
IEEE
13 years 11 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
IEEEARES
2010
IEEE
13 years 11 months ago
Katana: A Hot Patching Framework for ELF Executables
Ashwin Ramaswamy, Sergey Bratus, Sean W. Smith, Mi...
IEEEARES
2010
IEEE
13 years 11 months ago
Information Flow in Disaster Management Systems
Achim D. Brucker, Dieter Hutter
IEEEARES
2010
IEEE
13 years 11 months ago
Formalization of Viruses and Malware Through Process Algebras
Abstract—Abstract virology has seen the apparition of successive viral models, all based on Turing-equivalent formalisms. Considering recent malware, these are only partially cov...
Grégoire Jacob, Eric Filiol, Hervé D...
IEEEARES
2010
IEEE
13 years 11 months ago
Solving the Transitive Access Problem for the Services Oriented Architecture
: © Solving the Transitive Access Problem for the Services Oriented Architecture Alan H. Karp, Jun Li HP Laboratories HPL-2008-204R1 SOA, web services, access control, RBAC, PBAC,...
Alan H. Karp, Jun Li