Sciweavers

694 search results - page 4 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
IMCS
2007
78views more  IMCS 2007»
14 years 9 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
METAINFORMATICS
2005
Springer
15 years 2 months ago
Issues of usability in hypermedia systems: a usability estimation questionnaire for hypermedia designers
Open Hypermedia have come up with several systems, which can provide services to software developers. This paper argues that usability is a critical attribute that should be taken...
Nikos Tsirakis, Nikos Karousos, George Gkotsis
VIZSEC
2005
Springer
15 years 2 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
CHI
2009
ACM
15 years 10 months ago
Correlations among prototypical usability metrics: evidence for the construct of usability
Correlations between prototypical usability metrics from 90 distinct usability tests were strong when measured at the task-level (r between .44 and .60). Using test-level satisfac...
Jeff Sauro, James R. Lewis
109
Voted
TITB
2010
181views Education» more  TITB 2010»
14 years 4 months ago
PSKA: usable and secure key agreement scheme for body area networks
A Body Area Network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized health-care. Securing inter-sensor communications within BANs is essen...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...