BOLT 发表于 2025-3-25 04:33:57

Usability and Security of Personal Firewalls conducted a cognitive walkthrough paying special attention to user guidance and user decision support..We conclude that a stronger emphasis on user guidance, on conveying the design of the personal firewall application, on the principle of least privilege and on implications of default settings wou

出没 发表于 2025-3-25 10:27:54

Improving the Information Security Model by using TFIn this paper, we introduce a holistic view of information security based on a Swedish model combined with a literature survey. Furthermore we suggest extending this model using concepts based on semiotic theory and adopting the view of an information system as constituted of the technical, formal an

Rankle 发表于 2025-3-25 13:37:04

http://reply.papertrans.cn/67/6648/664787/664787_23.png

DECRY 发表于 2025-3-25 17:53:21

Conference proceedings 2007search contributions that focus both on access control in complex environments and on other aspects of computer security and privacy were solicited for submission to IFIP/SEC 2007. A total of 107 submissions were received, which were all reviewed by at least three members of the international progra

FRONT 发表于 2025-3-25 20:24:26

New Approaches for Security, Privacy and Trust in Complex EnvironmentsProceedings of the I

saturated-fat 发表于 2025-3-26 03:00:28

http://reply.papertrans.cn/67/6648/664787/664787_26.png

Sedative 发表于 2025-3-26 07:21:26

New Approaches for Security, Privacy and Trust in Complex Environments978-0-387-72367-9Series ISSN 1868-4238 Series E-ISSN 1868-422X

澄清 发表于 2025-3-26 11:00:43

IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/n/image/664787.jpg

Ceremony 发表于 2025-3-26 13:00:18

https://doi.org/10.1007/978-0-387-72367-9Access Control; Computer-Based Trust; Digital Forensics; Firewall; Human Computer Interaction; Informatio

圆木可阻碍 发表于 2025-3-26 18:36:26

Hein Venter,Mariki Eloff,Rossouw SolmsMost up-to-date research on computer security and privacy.Covers a range of topics including digital forensics, access control, and human computer interaction.Includes supplementary material:
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: New Approaches for Security, Privacy and Trust in Complex Environments; Proceedings of the I Hein Venter,Mariki Eloff,Rossouw Solms Confere