forebear
发表于 2025-3-25 05:55:29
http://reply.papertrans.cn/27/2691/269014/269014_21.png
世俗
发表于 2025-3-25 08:33:04
http://reply.papertrans.cn/27/2691/269014/269014_22.png
警告
发表于 2025-3-25 13:54:20
http://reply.papertrans.cn/27/2691/269014/269014_23.png
heckle
发表于 2025-3-25 17:21:48
http://image.papertrans.cn/d/image/269014.jpg
Restenosis
发表于 2025-3-25 21:38:13
Usable and Secure Software Design: The State-of-the-Artt review of usability and security in general, and HCI-Security (HCI-Sec) in particular. For those readers interested in such a review, I would recommend [.]. I begin by identifying several common themes in the design of effective information security and reviews work by the HCI-Sec community toward
Graduated
发表于 2025-3-26 04:04:11
A Conceptual Model for Usable Secure Requirements Engineeringent research on meta-models for Security Requirements Engineering, to help structure and manage Usability, Security, and Requirements Engineering activities in different contexts. I present an overview of the conceptual model itself, before describing each view of the meta-model: Environment, Asset,
Lime石灰
发表于 2025-3-26 07:53:54
http://reply.papertrans.cn/27/2691/269014/269014_27.png
vanquish
发表于 2025-3-26 10:09:41
http://reply.papertrans.cn/27/2691/269014/269014_28.png
PANT
发表于 2025-3-26 16:13:46
Case Study: Securing a Medical Data Portalte research data sharing. I present the context of the project within which this study was situated, before presenting the IRIS process adopted, and our use of both IRIS and CAIRIS. I describe the results of our work, before concluding with some lessons learned.
folliculitis
发表于 2025-3-26 20:41:14
http://reply.papertrans.cn/27/2691/269014/269014_30.png