Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Information sharing is the defining principle for public safety and Web Services is the technology best positioned to facilitate sharing and lower costs. The National Law Enforcem...
Graphical password schemes have been proposed as an alternative to text passwords in applications that support graphics and mouse or stylus entry. In this paper we detail what is,...
Increasingly, systems are composed from independently developed parts, and mechanisms that allow those parts to interact (connectors). In many situations, specialized forms of int...
The inherent difficulty in supporting human usability in large control systems--such as building environmental and security systems--derives from the large diversity of components...
Robin R. Penner, Erik S. Steinmetz, Christopher L....