Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
Policy authors typically reconcile several different mental models and goals, such as enabling collaboration, securing information, and conveying trust in colleagues. The data un...
In this paper, we present a pattern-based software development method that preserves usability and security quality characteristics using a role-driven mapping of requirements anal...
Trust plays important roles in diverse decentralized environments, including our society at large. Computational trust models help to, for instance, guide users’ judgements in o...
Xin Liu, Anwitaman Datta, Krzysztof Rzadca, Ee-Pen...
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...