Sciweavers

2236 search results - page 195 / 448
» Secure Software Design in Practice
Sort
View
124
Voted
WWW
2010
ACM
15 years 11 months ago
Malicious interface design: exploiting the user
In an ideal world, interface design is the art and science of helping users accomplish tasks in a timely, efficient, and pleasurable manner. This paper studies the inverse situati...
Gregory J. Conti, Edward Sobiesk
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
15 years 9 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
SIGSOFT
2004
ACM
16 years 4 months ago
Reasoning about partial goal satisfaction for requirements and design engineering
Exploring alternative options is at the heart of the requirements and design processes. Different alternatives contribute to different degrees of achievement of non-functional goa...
Emmanuel Letier, Axel van Lamsweerde
147
Voted
EICS
2009
ACM
15 years 10 months ago
A responsibility-based pattern language for usability-supporting architectural patterns
Usability-supporting architectural patterns (USAPs) were developed as a way to explicitly connect the needs of architecturally-sensitive usability concerns to the design of softwa...
Bonnie E. John, Len Bass, Elspeth Golden, Pia Stol...
155
Voted
PDC
2004
ACM
15 years 9 months ago
Lost in translation: a critical analysis of actors, artifacts, agendas, and arenas in participatory design
As computer technologies start to permeate the everyday activities of a continuously growing population, social and technical as well as political and legal issues will surface. P...
Rogério De Paula