Sciweavers

3811 search results - page 92 / 763
» The Safe-Tcl Security Model
Sort
View
CHI
2010
ACM
15 years 6 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...
ACSAC
2002
IEEE
15 years 4 months ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
15 years 6 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila
PADS
2005
ACM
15 years 5 months ago
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises
The RINSE simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of...
Michael Liljenstam, Jason Liu, David M. Nicol, You...
113
Voted
GI
2003
Springer
15 years 5 months ago
Byzantine Failures and Security: Arbitrary is not (always) Random
: The Byzantine failure model allows arbitrary behavior of a certain fraction of network nodes in a distributed system. It was introduced to model and analyze the effects of very s...
Felix C. Gärtner