C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Two experiences designing for effective security.
Rogério de Paula
Xianghua Ding
Paul Dourish
Kari Nies
Ben Pillet
David F. Redmiles
Jie Ren
Jennifer Ann Rode
Roberto Silveira Silva Filho
Published in:
SOUPS (2005)
Keyphrases
</>
access control
network security
information security
data sets
intrusion detection
high quality
low cost
computer systems
computationally efficient
machine learning
real time
security policies
security issues
security requirements
elliptic curve
security threats
designing effective