Sciweavers

15379 search results - page 159 / 3076
» Protecting users from
Sort
View
102
Voted
IMCS
2007
78views more  IMCS 2007»
14 years 10 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
ASPLOS
2008
ACM
15 years 15 days ago
Archipelago: trading address space for reliability and security
Memory errors are a notorious source of security vulnerabilities that can lead to service interruptions, information leakage and unauthorized access. Because such errors are also ...
Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Ben...
AVI
2000
14 years 12 months ago
Generating User Interface Code in a Model Based User Interface Development Environment
Declarative models play an important role in most software design activities, by allowing designs to be constructed that selectively abstract over complex implementation details. ...
Paulo Pinheiro da Silva, Tony Griffiths, Norman W....
CHI
2005
ACM
15 years 11 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
ACL
2009
14 years 8 months ago
Setting Up User Action Probabilities in User Simulations for Dialog System Development
User simulations are shown to be useful in spoken dialog system development. Since most current user simulations deploy probability models to mimic human user behaviors, how to se...
Hua Ai, Diane J. Litman