Sciweavers

12478 search results - page 281 / 2496
» Secure Interaction Design
Sort
View
SAFECOMP
2001
Springer
15 years 9 months ago
Designing Safety into Medical Decisions and Clinical Processes
After many years of experimental research software systems to support clinical decisionmaking are now moving into routine clinical practice. Most of the research to date has been ...
John Fox
135
Voted
ACSAC
2004
IEEE
15 years 8 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
138
Voted
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
15 years 4 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
ICDIM
2008
IEEE
15 years 11 months ago
Towards e-Government: The security SOA approach of the University of Murcia
This paper describes the experience of the University of Murcia in the design and development of security SOA infrastructures for electronic government, which provide university c...
Daniel Sánchez-Martínez, C. Inmacula...
IFIP
1992
Springer
15 years 8 months ago
Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?
On initiative of the Commission of the European Communities, the Information Technology Security Evaluation Criteria (ITSEC) are designed to provide a yardstick for the evaluation...
Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg