HCI and Security Systems
Texte intégral
Documents relatifs
On the other hand, several works have been conducted to explore the possibility of adapting conventional security protocols, initially proposed for wired networks, by altering
In Section 5, the Security Evabio tool which is an on-line tool for the security and privacy assessment of biometric systems is presented.. Future trends of the chapter are then
The aim of our work is to promote the usage of a socio-technical systems (STS) approach to support the emerging role of systems thinking in cyber security education using
In the Personal Infor- mation Security Assistant (PISA) project 1 , we aim to reduce security risks and enhance the privacy of users by persuading them to change their attitudes
Alexander Pretschner Technical University of Munich, Germany Rami Puzis Ben Gurion University of the Negev, Israel Rui Qiao Virginia Polytechnic Institute and State
This resulted in 15 means objectives, organized into four categories (minimize system interruptions and licensing restrictions, maximize information retrieval,
The proposed pair-wise privilege control scheme contains three parts, namely the privacy-label based subject granular privilege control (PSPC) module, the
The figure is organized in four columns, on the left side we find two columns related with Security activities (one for the development activities and the other for