Sciweavers

12478 search results - page 193 / 2496
» Secure Interaction Design
Sort
View
151
Voted
ACMDIS
2010
ACM
15 years 4 months ago
HCI and environmental sustainability: the politics of design and the design of politics
Many HCI researchers have recently begun to examine the opportunities to use ICTs to promote environmental sustainability and ecological consciousness on the part of technology us...
Paul Dourish
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
15 years 8 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...
128
Voted
ACSAC
2009
IEEE
15 years 10 months ago
Semantically Rich Application-Centric Security in Android
—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the...
Machigar Ongtang, Stephen E. McLaughlin, William E...
IWAN
2004
Springer
15 years 9 months ago
Secure, Customizable, Many-to-One Communication
Concast is a customizable many-to-one network-layer communication service. Although programmable services like concast can improve the efficiency of group applications, accompanyi...
Kenneth L. Calvert, Jim Griffioen, Billy Mullins, ...
CHI
2008
ACM
15 years 6 months ago
Sesame: informing user security decisions with system visualization
Non-expert users face a dilemma when making security decisions. Their security often cannot be fully automated for them, yet they generally lack both the motivation and technical ...
Jennifer Stoll, Craig S. Tashman, W. Keith Edwards...