Sciweavers

12478 search results - page 11 / 2496
» Secure Interaction Design
Sort
View
93
Voted
CHI
2008
ACM
16 years 2 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
CHI
2010
ACM
15 years 5 months ago
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices
Implantable medical devices (IMDs) improve patients' quality of life and help sustain their lives. In this study, we explore patient views and values regarding their devices ...
Tamara Denning, Alan Borning, Batya Friedman, Bria...
INTERACTIONS
2002
253views more  INTERACTIONS 2002»
15 years 1 months ago
Conceptual models: begin by designing what to design
logy Abstracts/EyeWire, Inc.
Jeff Johnson, Austin Henderson
103
Voted
UIALL
2004
Springer
15 years 7 months ago
A Framework for Context-Sensitive Coordination of Human Interruptions in Human-Computer Interaction
Abstract. Recent trends in software development directed toward intelligence, distribution, and mobility need to be followed by an increased sophistication in user interface design...
Sonja Gievska, John L. Sibert
98
Voted
OOPSLA
1998
Springer
15 years 6 months ago
Role Model Based Framework Design and Integration
Today, any large object-oriented software system is built using frameworks. Yet, designing frameworks and defining their interaction with clients remains a difficult task. A prima...
Dirk Riehle, Thomas R. Gross