Sciweavers

12478 search results - page 27 / 2496
» Secure Interaction Design
Sort
View
INTERACTIONS
2010
73views more  INTERACTIONS 2010»
15 years 10 days ago
Reframing health to embrace design of our own well-being
Hugh Dubberly, Rajiv Mehta, Shelley Evenson, Paul ...
115
Voted
ISADS
1999
IEEE
15 years 6 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
15 years 5 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
132
Voted
IJWIS
2007
153views more  IJWIS 2007»
15 years 1 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...