Sciweavers

12478 search results - page 225 / 2496
» Secure Interaction Design
Sort
View
OOPSLA
1998
Springer
15 years 8 months ago
How to Preserve the Benefits of Design Patterns
The rapid evolution of Design Patterns has hampered the benefits gained from using Design Patterns. The increase in the number of Design Patterns makes a common vocabulary unmanag...
Ellen Agerbo, Aino Cornils
FOSAD
2007
Springer
15 years 10 months ago
Secure Service Orchestration
Abstract. We present a framework for designing and composing services in a secure manner. Services can enforce security policies locally, and can invoke other services in a “call...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
VIZSEC
2004
Springer
15 years 9 months ago
PortVis: a tool for port-based detection of security events
Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, To...
FC
2003
Springer
125views Cryptology» more  FC 2003»
15 years 9 months ago
Economics, Psychology, and Sociology of Security
Security is not an isolated good, but just one component of a complicated economy. That imposes limitations on how effective it can be. The interactions of human society and human...
Andrew M. Odlyzko
CN
1999
88views more  CN 1999»
15 years 3 months ago
Building a high-performance, programmable secure coprocessor
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can Z .execute and accumulate state , free of observation and inte...
Sean W. Smith, Steve Weingart