Sciweavers

2648 search results - page 21 / 530
» Human Factors In Computer Security
Sort
View
CCS
2010
ACM
14 years 10 months ago
User-friendly matching protocol for online social networks
In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in use...
Qiang Tang
SIGUCCS
2005
ACM
15 years 3 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
PERCOM
2007
ACM
15 years 9 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
SOUPS
2006
ACM
15 years 3 months ago
Aligning usability and security: a usability study of Polaris
Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software ‘Polar...
Alexander J. DeWitt, Jasna Kuljis
CHI
2011
ACM
14 years 1 months ago
MonoTrans2: a new human computation system to support monolingual translation
In this paper, we present MonoTrans2, a new user interface to support monolingual translation; that is, translation by people who speak only the source or target language, but not...
Chang Hu, Benjamin B. Bederson, Philip Resnik, Yak...