Sciweavers

12478 search results - page 198 / 2496
» Secure Interaction Design
Sort
View
MHCI
2005
Springer
15 years 9 months ago
Context-based design of mobile applications for museums: a survey of existing practices
This paper includes a review of mobile applications used in museum environments, focusing on the notion of context and its constituent dimensions. Museums are a representative exa...
Dimitris Raptis, Nikolaos K. Tselios, Nikolaos M. ...
106
Voted
ICDE
2008
IEEE
131views Database» more  ICDE 2008»
15 years 10 months ago
PLUS: Synthesizing privacy, lineage, uncertainty and security
— Privacy, lineage, uncertainty, and security are important to many information integration efforts, and these “PLUS” properties interact in a number of complex ways. This pa...
Barbara T. Blaustein, Len Seligman, Michael Morse,...
135
Voted
CCS
2009
ACM
15 years 10 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
124
Voted
WWW
2008
ACM
16 years 4 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
HICSS
2010
IEEE
487views Biometrics» more  HICSS 2010»
15 years 10 months ago
A Survey of Game Theory as Applied to Network Security
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two de...
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipank...