Sciweavers

12478 search results - page 252 / 2496
» Secure Interaction Design
Sort
View
CSCW
1998
ACM
15 years 8 months ago
Design for Individuals, Design for Groups: Tradeoffs between Power and Workspace Awareness
Users of synchronous groupware systems act both as individuals and as members of a group, and designers must try to support both roles. However, the requirements of individuals an...
Carl Gutwin, Saul Greenberg
ASWEC
2008
IEEE
15 years 11 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
WS
2004
ACM
15 years 10 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...
ACMDIS
2010
ACM
15 years 2 months ago
Designing for the invisible: user-centered design of infrastructure awareness systems
Infrastructure awareness systems reveal invisible aspects of infrastructures to their existing or potential users. Designing such systems is challenging as it requires making visi...
Juan David Hincapié-Ramos, Aurélien ...
CODES
2005
IEEE
15 years 10 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...