標(biāo)題: Titlebook: Designing Usable and Secure Software with IRIS and CAIRIS; Shamal Faily Textbook 2018 Springer International Publishing AG, part of Spring [打印本頁] 作者: 多話 時間: 2025-3-21 18:50
書目名稱Designing Usable and Secure Software with IRIS and CAIRIS影響因子(影響力)
書目名稱Designing Usable and Secure Software with IRIS and CAIRIS影響因子(影響力)學(xué)科排名
書目名稱Designing Usable and Secure Software with IRIS and CAIRIS網(wǎng)絡(luò)公開度
書目名稱Designing Usable and Secure Software with IRIS and CAIRIS網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Designing Usable and Secure Software with IRIS and CAIRIS被引頻次
書目名稱Designing Usable and Secure Software with IRIS and CAIRIS被引頻次學(xué)科排名
書目名稱Designing Usable and Secure Software with IRIS and CAIRIS年度引用
書目名稱Designing Usable and Secure Software with IRIS and CAIRIS年度引用學(xué)科排名
書目名稱Designing Usable and Secure Software with IRIS and CAIRIS讀者反饋
書目名稱Designing Usable and Secure Software with IRIS and CAIRIS讀者反饋學(xué)科排名
作者: EXUDE 時間: 2025-3-21 22:24 作者: AGOG 時間: 2025-3-22 03:31 作者: Proclaim 時間: 2025-3-22 05:51
R. B. Vallee,J. S. Herskovits,C. C. BurgessIn this chapter, I summarise the challenges that make designing for usability and security hard, and outline the structure of this book.作者: lesion 時間: 2025-3-22 10:25 作者: RADE 時間: 2025-3-22 13:44 作者: RADE 時間: 2025-3-22 17:03 作者: 沉積物 時間: 2025-3-22 23:03
https://doi.org/10.1007/978-3-319-75493-2security; usability; requirements; IRIS; CAIRIS; software design作者: 者變 時間: 2025-3-23 04:07 作者: 貧困 時間: 2025-3-23 06:42 作者: 混合 時間: 2025-3-23 10:03
Case Study: Defending Critical Infrastructure Against Stuxnetollowing reports of the Stuxnet worm. I present the organisational context, before presenting the IRIS process adopted, and the use of both IRIS and CAIRIS. I describe the results of this work, before concluding with some lessons learned.作者: 異常 時間: 2025-3-23 15:44 作者: commute 時間: 2025-3-23 18:39
Handbook of Experimental Pharmacologyt review of usability and security in general, and HCI-Security (HCI-Sec) in particular. For those readers interested in such a review, I would recommend [.]. I begin by identifying several common themes in the design of effective information security and reviews work by the HCI-Sec community toward作者: Pcos971 時間: 2025-3-23 23:56
https://doi.org/10.1007/978-3-642-78345-6ent research on meta-models for Security Requirements Engineering, to help structure and manage Usability, Security, and Requirements Engineering activities in different contexts. I present an overview of the conceptual model itself, before describing each view of the meta-model: Environment, Asset,作者: 令人作嘔 時間: 2025-3-24 06:16
Extended Unification and its Implementationeristics needed to support the IRIS framework. I introduce the design principles that guided the development of CAIRIS in Sect.?., before briefly describing how the platform was developed in Sect.?.. The design of CAIRIS is then reviewed in terms of its high level architecture, physical deployment, 作者: 聯(lián)合 時間: 2025-3-24 06:36
https://doi.org/10.1007/978-3-642-71145-9pproach for building personas as part of an IRIS process. Such processes typically rely on empirical data collected for the purpose of creating and using personas, but such data is not always easy to obtain. To work around this restriction, I describe how argumentation models can be used to provide 作者: ANTI 時間: 2025-3-24 14:03 作者: 性行為放縱者 時間: 2025-3-24 16:16 作者: Acumen 時間: 2025-3-24 22:31 作者: 男學(xué)院 時間: 2025-3-25 00:21
Context Logic - An Introductiony across different device platforms [.]. I begin by considering what we can learn from Research and Development projects, before presenting the webinos project and its objectives, the design approach taken to develop the webinos platform, and the part played by security and usability design techniqu作者: forebear 時間: 2025-3-25 05:55 作者: 世俗 時間: 2025-3-25 08:33 作者: 警告 時間: 2025-3-25 13:54 作者: heckle 時間: 2025-3-25 17:21
http://image.papertrans.cn/d/image/269014.jpg作者: Restenosis 時間: 2025-3-25 21:38
Usable and Secure Software Design: The State-of-the-Artt review of usability and security in general, and HCI-Security (HCI-Sec) in particular. For those readers interested in such a review, I would recommend [.]. I begin by identifying several common themes in the design of effective information security and reviews work by the HCI-Sec community toward作者: Graduated 時間: 2025-3-26 04:04
A Conceptual Model for Usable Secure Requirements Engineeringent research on meta-models for Security Requirements Engineering, to help structure and manage Usability, Security, and Requirements Engineering activities in different contexts. I present an overview of the conceptual model itself, before describing each view of the meta-model: Environment, Asset,作者: Lime石灰 時間: 2025-3-26 07:53 作者: vanquish 時間: 2025-3-26 10:09 作者: PANT 時間: 2025-3-26 16:13
Case Study: Securing a Medical Data Portalte research data sharing. I present the context of the project within which this study was situated, before presenting the IRIS process adopted, and our use of both IRIS and CAIRIS. I describe the results of our work, before concluding with some lessons learned.作者: folliculitis 時間: 2025-3-26 20:41 作者: 彎彎曲曲 時間: 2025-3-26 20:56 作者: 步兵 時間: 2025-3-27 01:09
Case Study: Securing An Internet of Things Middlewarey across different device platforms [.]. I begin by considering what we can learn from Research and Development projects, before presenting the webinos project and its objectives, the design approach taken to develop the webinos platform, and the part played by security and usability design techniqu作者: dissolution 時間: 2025-3-27 07:14 作者: 約會 時間: 2025-3-27 11:12 作者: 鎮(zhèn)壓 時間: 2025-3-27 13:49 作者: Meditative 時間: 2025-3-27 21:42
Handbook of Experimental Pharmacologyts Engineering might be cogent to the design of usability. In particular, I review several dominant Requirements Engineering approaches, and consider issues which may arise when viewing them from a usability perspective. I also introduce the concept of a . and illustrate how existing Requirements En作者: 咯咯笑 時間: 2025-3-27 22:43 作者: saturated-fat 時間: 2025-3-28 05:36
tion.?.Real-world examples are provided of the techniques and processes illustrated in this book, making this text a resource for practitioners, researchers, educators, and students..978-3-319-75492-5978-3-319-75493-2作者: 完全 時間: 2025-3-28 07:00 作者: 狗舍 時間: 2025-3-28 10:53
Designing Usable and Secure Software with IRIS and CAIRIS978-3-319-75493-2作者: 音的強(qiáng)弱 時間: 2025-3-28 15:56 作者: slipped-disk 時間: 2025-3-28 22:22
Extended Unification and its Implementationribing how the platform was developed in Sect.?.. The design of CAIRIS is then reviewed in terms of its high level architecture, physical deployment, and visual layout in Sect.?., before describing how the platform’s characteristics satisfy the design principles we wish to foster in Sect.?..作者: 修飾語 時間: 2025-3-29 02:46 作者: strain 時間: 2025-3-29 05:20
Elizabeth Garner,Wolfgang HeinzRIS realises the idea of “design as code”. I conclude by demonstrating the use of CAIRIS to model both functional and human concerns, and show how CAIRIS models help evaluate research when participants can be difficult to find or reach.作者: 清洗 時間: 2025-3-29 09:19 作者: 形上升才刺激 時間: 2025-3-29 11:55 作者: Shuttle 時間: 2025-3-29 17:35 作者: 解決 時間: 2025-3-29 23:05 作者: promote 時間: 2025-3-30 02:00
Context Logic - An Introductiones. I describe the difficulties faced in applying these techniques, together with the approaches taken to tackle them. Finally, we reflect on lessons for those looking to align security and usability design in projects of this nature.作者: 物種起源 時間: 2025-3-30 06:30
https://doi.org/10.1007/978-3-642-71145-9s, providing a means of effectively validating personas. Building on the use of argumentation models, I explore how these can be used to better adapt scenarios for usability and security using .: scenarios which describe how design decisions may lead to usability problems subsequently leading to system misuse.作者: 財產(chǎn) 時間: 2025-3-30 09:40
Adapting Personas and Scenarios for Security and Usability Designs, providing a means of effectively validating personas. Building on the use of argumentation models, I explore how these can be used to better adapt scenarios for usability and security using .: scenarios which describe how design decisions may lead to usability problems subsequently leading to system misuse.作者: Brain-Imaging 時間: 2025-3-30 13:36
A Conceptual Model for Usable Secure Requirements Engineering Task, Goal, Risk, and Responsibility. For each view, I present and justify the related concepts and their relationships. I illustrate each aspect of the meta-model using examples from a specification exemplar: NeuroGrid.作者: GAVEL 時間: 2025-3-30 18:44