Sciweavers

12478 search results - page 300 / 2496
» Secure Interaction Design
Sort
View
WETICE
2000
IEEE
15 years 9 months ago
Reducing Software Security Risk through an Integrated Approach
This paper presents joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the Nation...
David P. Gilliam, John C. Kelly, Matt Bishop
BPSC
2009
184views Business» more  BPSC 2009»
15 years 5 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
CHI
2010
ACM
15 years 10 months ago
Hand in hand with the material: designing for suppleness
Designing for a supple interaction, involving users bodily and emotionally into a ‘dance’ with a system is a challenging task. Any break-ups in interaction become fatal to the...
Petra Sundström, Kristina Höök
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
15 years 6 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng
CHI
2003
ACM
16 years 5 months ago
The challenges of user-centered design and evaluation for infrastructure
Infrastructure software comprises code libraries or runtime processes that support the development or operation of application software. A particular infrastructure system may sup...
W. Keith Edwards, Victoria Bellotti, Anind K. Dey,...