Sciweavers

12478 search results - page 110 / 2496
» Secure Interaction Design
Sort
View
118
Voted
ESORICS
2007
Springer
15 years 9 months ago
Obligations and Their Interaction with Programs
Obligations are pervasive in modern systems, often linked to access control decisions. We present a very general model of obligations as objects with state, and discuss its interac...
Daniel J. Dougherty, Kathi Fisler, Shriram Krishna...
ISI
2008
Springer
15 years 3 months ago
Analyzing content development and visualizing social interactions in Web forum
Web forums provide platforms for any Internet users around the world to communicate with each other and express their opinions. In many of the discussions in Web Forums, it involve...
Christopher C. Yang, Tobun Dorbin Ng
128
Voted
ACSAC
2005
IEEE
15 years 9 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
104
Voted
AOSE
2005
Springer
15 years 9 months ago
Hermes: Designing Goal-Oriented Agent Interactions
Interactions between agents are traditionally specified as interaction protocols using notations such as Petri nets, AUML, or finite state machines. These protocols are a poor ...
Christopher Cheong, Michael Winikoff
113
Voted
AVI
2004
15 years 4 months ago
Designing interaction, not interfaces
Although the power of personal computers has increased 1000-fold over the past 20 years, user interfaces remain essentially the same. Innovations in HCI research, particularly nov...
Michel Beaudouin-Lafon