Sciweavers

12478 search results - page 197 / 2496
» Secure Interaction Design
Sort
View
ESORICS
2008
Springer
15 years 5 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
ECIS
2003
15 years 5 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica
IMCS
2007
78views more  IMCS 2007»
15 years 3 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
122
Voted
CHI
2003
ACM
16 years 4 months ago
Design-oriented human-computer interaction
We argue that HCI has emerged as a design-oriented field of research, directed at large towards innovation, design, and construction of new kinds of information and interaction te...
Daniel Fallman
149
Voted
CHI
2006
ACM
16 years 4 months ago
Making memories: applying user input logs to interface design and evaluation
In this paper, we describe our approach to designing interface components that automate the logging of user input. These recorded logs of user-system interactions can serve as a b...
Tamara Babaian, Wendy T. Lucas, Heikki Topi