Sciweavers

1597 search results - page 27 / 320
» Mental Models of Computer Security
Sort
View
IMF
2007
15 years 3 months ago
A Common Process Model for Incident Response and Computer Forensics
: Incident Response and Computer Forensics are two areas with similar goals but distinct process models. While in both cases the goal is to investigate computer security incidents ...
Felix C. Freiling, Bastian Schwittay
113
Voted
CHI
2009
ACM
15 years 8 months ago
Time sequences
Visualisations of dynamic data change in appearance over time, reflecting changes in the underlying data, be that the development of a social network, or the addition or removal o...
Ross Shannon, Aaron J. Quigley, Paddy Nixon
FTDCS
1999
IEEE
15 years 6 months ago
Supporting Real World Security Models in Java
The Java Security Model has undergone considerable evolution since its initial implementation. However, due to its historical focus on securing machines against attack from hostil...
Ian Welch, Robert J. Stroud
111
Voted
SOSP
2009
ACM
15 years 10 months ago
Fabric: a platform for secure distributed computation and storage
Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows heterogeneous network nodes to securely share bot...
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Luc...
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 8 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich