Sciweavers

5119 search results - page 96 / 1024
» Security Privacy
Sort
View
85
Voted
SOUPS
2009
ACM
15 years 10 months ago
A multi-method approach for user-centered design of identity management systems
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
88
Voted
SOUPS
2009
ACM
15 years 10 months ago
It's not what you know, but who you know: a social approach to last-resort authentication
Stuart E. Schechter, Serge Egelman, Robert W. Reed...
100
Voted
SOUPS
2009
ACM
15 years 10 months ago
Integrating usability and accessibility in information assurance education
Azene Zenebe, Claude Tuner, Jinjuan Feng, Jonathan...
124
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL
Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joo...
124
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection
Peng Li, Hyundo Park, Debin Gao, Jianming Fu