Sciweavers

12478 search results - page 206 / 2496
» Secure Interaction Design
Sort
View
SAFECOMP
2005
Springer
15 years 9 months ago
Justification of Smart Sensors for Nuclear Applications
This paper describes the results of a research study sponsored by the UK nuclear industry into methods of justifying smart sensors. Smart sensors are increasingly being used in the...
Peter G. Bishop, Robin E. Bloomfield, Sofia Guerra...
SWS
2005
ACM
15 years 9 months ago
Web services enterprise security architecture: a case study
Web Services (WS hereafter) Security is a crucial aspect for technologies based on this paradigm to be completely adopted by the industry. As a consequence, a lot of initiatives h...
Carlos Gutiérrez, Eduardo Fernández-...
ACSAC
2003
IEEE
15 years 9 months ago
PSOS Revisited
This paper provides a retrospective view of the design of SRI’s Provably Secure Operating System (PSOS), a formally specified tagged-capability hierarchical system architecture...
Peter G. Neumann, Richard J. Feiertag
EWSA
2006
Springer
15 years 7 months ago
Preserving Software Quality Characteristics from Requirements Analysis to Architectural Design
In this paper, we present a pattern-based software development method that preserves usability and security quality characteristics using a role-driven mapping of requirements anal...
Holger Schmidt, Ina Wentzlaff
IWEC
2010
15 years 5 months ago
The 'Interactive' of Interactive Storytelling: Customizing the Gaming Experience
In this article, we define interactive storytelling as a gaming experience where the form and content of the game is customized in real time and tailored to the preferences and ne...
Barbaros Bostan, Tim Marsh