Modeling the behavior of users who are confronted with security mechanisms
S Möller, N Ben-Asher, KP Engelbrecht, R Englert… - … & Security, 2011 - Elsevier
… This highlights the need to design security mechanisms in a way which incites the user to …
Thus, we assume that the quality of the security mechanism is at the basis for the user’s …
Thus, we assume that the quality of the security mechanism is at the basis for the user’s …
[PDF][PDF] Security mechanisms in high-level network protocols
VL Voydock, ST Kent - ACM Computing Surveys (CSUR), 1983 - dl.acm.org
… This paper analyzes the implications of adding security mechanisms to high-level 1
network protocols. For generality, we assume that these protocols operate in an environment …
network protocols. For generality, we assume that these protocols operate in an environment …
[图书][B] IT-security and privacy: design and use of privacy-enhancing security mechanisms
S Fischer-Hübner - 2001 - Springer
… IT (Information Technology) Security mechanisms are needed to protect personal data
and thus IT Security is often regarded as the technical side of privacy. IT … mechanisms that …
and thus IT Security is often regarded as the technical side of privacy. IT … mechanisms that …
A comprehensive survey of security mechanisms in healthcare applications
DS David, A Jeyachandran - 2016 international conference on …, 2016 - ieeexplore.ieee.org
… The trade-off between the security and elasticity is the major requirement for the design of …
the encryption mechanism provides the necessary tradeoff between the security and elasticity. …
the encryption mechanism provides the necessary tradeoff between the security and elasticity. …
Evaluation of security mechanisms in wireless sensor networks
G Guimaraes, E Souto, D Sadok… - … (ICW'05, ICHSN'05 …, 2005 - ieeexplore.ieee.org
… The need to build security services into them remains however a considerable challenge as
… This work evaluates the impact of a number of security mechanism on sensor nodes and the …
… This work evaluates the impact of a number of security mechanism on sensor nodes and the …
Integrating security and usability into the requirements and design process
I Flechais, C Mascolo… - … of Electronic Security …, 2007 - inderscienceonline.com
… from the technological perspective, others from the human–computer interaction angle,
offering better User Interfaces (UIs) for improved usability of security mechanisms. However, …
offering better User Interfaces (UIs) for improved usability of security mechanisms. However, …
[PDF][PDF] Efficient Security Mechanisms for Routing Protocolsa.
… In particular, we design our mechanisms from purely symmetric cryptographic functions,
such as message authentication codes (MACs) or cryptographic hash functions. In contrast, …
such as message authentication codes (MACs) or cryptographic hash functions. In contrast, …
Security mechanisms used in microservices-based systems: A systematic mapping
… the design and results of a systematic mapping study to identify the security mechanisms used
in … are that (i) the studies mention 18 security mechanisms; (ii) the most mentioned security …
in … are that (i) the studies mention 18 security mechanisms; (ii) the most mentioned security …
[PDF][PDF] Towards OLAP security design—survey and research issues
… new security issues arise. The goal of this paper is to introduce an OLAP security design
methodology, … OLAP security mechanisms and their implementations in commercial systems are …
methodology, … OLAP security mechanisms and their implementations in commercial systems are …
SAFKASI: A security mechanism for language-based systems
… This section describes the design of the security-passing style transformation. Note that our
SPS model is simpler than the stack inspection model employed by the various Java vendors…
SPS model is simpler than the stack inspection model employed by the various Java vendors…
相关搜索
- security mechanisms in wireless sensor networks
- efficient security mechanisms
- behavior of users security mechanisms
- high level network protocols security mechanisms
- security mechanism time password
- systematic mapping security mechanisms
- healthcare applications security mechanisms
- design process security and usability
- secure systems user interaction design
- design and implementation secure data warehouse
- security mechanism personal health records
- time overhead security mechanisms
- comprehensive survey security mechanisms
- routing protocols security mechanisms