Sciweavers

694 search results - page 8 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
I3E
2001
126views Business» more  I3E 2001»
14 years 10 months ago
Symbolon - A Novel Concept For Secure e-Commerce
Electronic-banking applications (EBAs) are among the pioneers of electroniccommerce (e-commerce) applications. Like other e-commerce applications, they require sophisticated secur...
Sebastian Fischmeister, Günther Hagleitner, W...
CCS
2006
ACM
14 years 11 months ago
Vulnerability analysis For evaluating quality of protection of security policies
Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latif...
71
Voted
IJWET
2008
93views more  IJWET 2008»
14 years 9 months ago
Collective web usability analysis: cognitive and activity walkthroughs
: This paper reviews two walkthrough methods for the web design practitioner to assess their web-based systems. Their relative advantages and weaknesses, and suggestions for web ev...
Hokyoung Ryu
SOUPS
2005
ACM
15 years 3 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
EWSA
2006
Springer
15 years 1 months ago
Preserving Software Quality Characteristics from Requirements Analysis to Architectural Design
In this paper, we present a pattern-based software development method that preserves usability and security quality characteristics using a role-driven mapping of requirements anal...
Holger Schmidt, Ina Wentzlaff