Sciweavers

657 search results - page 48 / 132
» Secure and Usable Requirements Engineering
Sort
View
CSCWD
2005
Springer
14 years 11 months ago
Analytic Evaluation of Groupware Design
We propose an analytic method to evaluate groupware design. The method was inspired by GOMS, a well-known approach to analyze usability problems with single-user interfaces. GOMS h...
Pedro Antunes, Marcos R. S. Borges, José A....
FASE
2009
Springer
15 years 4 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 4 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 4 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
ISSRE
2008
IEEE
15 years 4 months ago
Assessing the Effect of Software Failures on Trust Assumptions
The contribution of this paper is a technique to assess whether software failures during operational use can invalidate the trust assumptions and, hence, the adequacy of the softw...
Qian Feng, Robyn R. Lutz