BOLT 发表于 2025-3-25 04:33:57
Usability and Security of Personal Firewalls conducted a cognitive walkthrough paying special attention to user guidance and user decision support..We conclude that a stronger emphasis on user guidance, on conveying the design of the personal firewall application, on the principle of least privilege and on implications of default settings wou出没 发表于 2025-3-25 10:27:54
Improving the Information Security Model by using TFIn this paper, we introduce a holistic view of information security based on a Swedish model combined with a literature survey. Furthermore we suggest extending this model using concepts based on semiotic theory and adopting the view of an information system as constituted of the technical, formal anRankle 发表于 2025-3-25 13:37:04
http://reply.papertrans.cn/67/6648/664787/664787_23.pngDECRY 发表于 2025-3-25 17:53:21
Conference proceedings 2007search contributions that focus both on access control in complex environments and on other aspects of computer security and privacy were solicited for submission to IFIP/SEC 2007. A total of 107 submissions were received, which were all reviewed by at least three members of the international prograFRONT 发表于 2025-3-25 20:24:26
New Approaches for Security, Privacy and Trust in Complex EnvironmentsProceedings of the Isaturated-fat 发表于 2025-3-26 03:00:28
http://reply.papertrans.cn/67/6648/664787/664787_26.pngSedative 发表于 2025-3-26 07:21:26
New Approaches for Security, Privacy and Trust in Complex Environments978-0-387-72367-9Series ISSN 1868-4238 Series E-ISSN 1868-422X澄清 发表于 2025-3-26 11:00:43
IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/n/image/664787.jpgCeremony 发表于 2025-3-26 13:00:18
https://doi.org/10.1007/978-0-387-72367-9Access Control; Computer-Based Trust; Digital Forensics; Firewall; Human Computer Interaction; Informatio圆木可阻碍 发表于 2025-3-26 18:36:26
Hein Venter,Mariki Eloff,Rossouw SolmsMost up-to-date research on computer security and privacy.Covers a range of topics including digital forensics, access control, and human computer interaction.Includes supplementary material: