Sciweavers

12478 search results - page 47 / 2496
» Secure Interaction Design
Sort
View
SOUPS
2005
ACM
15 years 7 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
ESORICS
1998
Springer
15 years 6 months ago
Rules for Designing Multilevel Object-Oriented Databases
When implementing a multilevel security policy for Object-Oriented Databases (OODBs), several aspects have to be investigated. One of these aspect is the design of multilevel OODB...
Frédéric Cuppens, Alban Gabillon
CHI
2010
ACM
15 years 7 months ago
Vote-o-graph: a dishonest touchscreen voting system
We present Vote-O-Graph, an experimental touchscreen voting system designed to simulate reported interface issues in existing electronic voting systems. Touchscreen miscalibration...
Andrea L. Mascher, Paul T. Cotton, Douglas W. Jone...
CAISE
2006
Springer
15 years 5 months ago
Trusted Interaction: User Control and System Responsibilities in Interaction Design for Information Systems
Trust emerges from interaction. If trust in information systems is to be promoted, then attention must be directed, at least in part, to interaction design. This presentation will ...
Larry L. Constantine
WICSA
2001
15 years 3 months ago
A Compositional Approach for Constructing Connectors
Increasingly, systems are composed from independently developed parts, and mechanisms that allow those parts to interact (connectors). In many situations, specialized forms of int...
Bridget Spitznagel, David Garlan