Modeling the behavior of users who are confronted with security mechanisms

S Möller, N Ben-Asher, KP Engelbrecht, R Englert… - … & Security, 2011 - Elsevier
… This highlights the need to design security mechanisms in a way which incites the user to …
Thus, we assume that the quality of the security mechanism is at the basis for the user’s …

[PDF][PDF] Security mechanisms in high-level network protocols

VL Voydock, ST Kent - ACM Computing Surveys (CSUR), 1983 - dl.acm.org
… This paper analyzes the implications of adding security mechanisms to high-level 1
network protocols. For generality, we assume that these protocols operate in an environment …

[图书][B] IT-security and privacy: design and use of privacy-enhancing security mechanisms

S Fischer-Hübner - 2001 - Springer
… IT (Information Technology) Security mechanisms are needed to protect personal data
and thus IT Security is often regarded as the technical side of privacy. IT … mechanisms that …

A comprehensive survey of security mechanisms in healthcare applications

DS David, A Jeyachandran - 2016 international conference on …, 2016 - ieeexplore.ieee.org
… The trade-off between the security and elasticity is the major requirement for the design of …
the encryption mechanism provides the necessary tradeoff between the security and elasticity. …

Evaluation of security mechanisms in wireless sensor networks

G Guimaraes, E Souto, D Sadok… - … (ICW'05, ICHSN'05 …, 2005 - ieeexplore.ieee.org
… The need to build security services into them remains however a considerable challenge as
… This work evaluates the impact of a number of security mechanism on sensor nodes and the …

Integrating security and usability into the requirements and design process

I Flechais, C Mascolo… - … of Electronic Security …, 2007 - inderscienceonline.com
… from the technological perspective, others from the human–computer interaction angle,
offering better User Interfaces (UIs) for improved usability of security mechanisms. However, …

[PDF][PDF] Efficient Security Mechanisms for Routing Protocolsa.

YC Hu, A Perrig, DB Johnson - Ndss, 2003 - Citeseer
… In particular, we design our mechanisms from purely symmetric cryptographic functions,
such as message authentication codes (MACs) or cryptographic hash functions. In contrast, …

Security mechanisms used in microservices-based systems: A systematic mapping

A Pereira-Vale, G Márquez, H Astudillo… - 2019 XLV Latin …, 2019 - ieeexplore.ieee.org
… the design and results of a systematic mapping study to identify the security mechanisms used
in … are that (i) the studies mention 18 security mechanisms; (ii) the most mentioned security

[PDF][PDF] Towards OLAP security design—survey and research issues

T Priebe, G Pernul - Proceedings of the 3rd ACM International Workshop …, 2000 - dl.acm.org
… new security issues arise. The goal of this paper is to introduce an OLAP security design
methodology, … OLAP security mechanisms and their implementations in commercial systems are …

SAFKASI: A security mechanism for language-based systems

DS Wallach, AW Appel, EW Felten - ACM Transactions on Software …, 2000 - dl.acm.org
… This section describes the design of the security-passing style transformation. Note that our
SPS model is simpler than the stack inspection model employed by the various Java vendors…