Sciweavers

129 search results - page 6 / 26
» Guidelines for designing IT security management tools
Sort
View
78
Voted
CAISE
1999
Springer
15 years 1 months ago
A Multilevel Secure Workflow Management System
The Department of Defense (DoD) needs multilevel secure (MLS) workflow management systems to enable globally distributed users and applications to cooperate across classification l...
Myong H. Kang, Judith N. Froscher, Amit P. Sheth, ...
83
Voted
ISQED
2002
IEEE
105views Hardware» more  ISQED 2002»
15 years 2 months ago
Measurement of Inherent Noise in EDA Tools
With advancing semiconductor technology and exponentially growing design complexities, predictability of design tools becomes an important part of a stable top-down design process...
Andrew B. Kahng, Stefanus Mantik
ACMDIS
2008
ACM
14 years 11 months ago
More than meets the eye: transforming the user experience of home network management
As computing migrates from the workplace to the home, householders must tackle problems of home network maintenance. Often they lack the technical knowledge or motivation to compl...
Erika Shehan Poole, Marshini Chetty, Rebecca E. Gr...
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
15 years 1 months ago
Security when people matter: structuring incentives for user behavior
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives p...
Rick Wash, Jeffrey K. MacKie-Mason
SOUPS
2009
ACM
15 years 4 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good