Sciweavers

12478 search results - page 109 / 2496
» Secure Interaction Design
Sort
View
119
Voted
CHI
1999
ACM
15 years 7 months ago
Emotional Interfaces for Interactive Aardvarks: Designing Affect into Social Interfaces for Children
Character-based social interfaces present a unique opportunity to integrate emotion into technology interactions. The present paper reports on the use of three emotional interacti...
Erik Strommen, Kristin Alexander
CHI
2011
ACM
14 years 7 months ago
Improving the safety of homeless young people with mobile phones: values, form and function
By their pervasiveness and by being worn on our bodies, mobile phones seem to have become intrinsic to safety. To examine this proposition, 43 participants, from four stakeholder ...
Jill Palzkill Woelfer, Amy Iverson, David G. Hendr...
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
15 years 9 months ago
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study
The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...
Nick Cook, Paul Robinson, Santosh K. Shrivastava
100
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
HAIS
2008
Springer
15 years 4 months ago
Multi-agent System for Management and Monitoring of Routes Surveillance
This paper presents a multi-agent system for security control on industrial environments. The system uses a set of wireless technologies and software agents which integrate reasoni...
Sara Rodríguez, Javier Bajo