نتایج جستجو برای: growth of task security

تعداد نتایج: 21269144  

2005
Yun-Maw Cheng Chris Johnson

Current research in design of Context-Aware applications appears very technology focused, in particular software and sensor development and deployment rather than utilizing Human-Computer Interaction (HCI) principles such as task analysis to assist design of the applications. Developers specify what context-aware behavior to implement and determine what context information is needed based on in...

Journal: :CoRR 2009
Shenghui Su Shuwang Lü

The authors discuss what is provable security in cryptography. Think that provable security is asymptotic, relative, and dynamic, and only a supplement to but not a replacement of exact security analysis. Because the conjecture P ≠ NP has not been proven yet, and it is possible in terms of the two incompleteness theorems of Kurt Gödel that there is some cryptosystem of which the security cannot...

Journal: :Information & Management 2002
Maarten Gelderman

From its inception on, the notion of management support systems (MS) has been closely linked to task structuredness. Using data collected with a survey questionnaire, this article presents the results of an empirical analysis of the relation between task structuredness and satisfaction with MS. Two dimensions of task structuredness are distinguished: task difficulty and task variability. The re...

2006
Stephen McCamant J. Gregory Morrisett

Executing untrusted code while preserving security requires that the code be prevented from modifying memory or executing instructions except as explicitly allowed. Software-based fault isolation (SFI) or “sandboxing” enforces such a policy by rewriting the untrusted code at the instruction level. However, the original sandboxing technique of Wahbe et al. is applicable only to RISC architecture...

Journal: :auditory and vestibular research 0
seyyed mohammad sabour ebrahimi research institute for education, sanandaj, iran bagher ghobari bonab department of psychology and education of exceptional children, faculty of psychology and educational sciences, university of tehran, tehran, iran

background and aim: function-based inter­vention have been shown to have positive increase in social skills of children with behavi­oral problems. the same findings can be potentially applied to the deaf and hard of hearing (d/hh) children. the present study examined the efficacy of differential reinforce­ment of alternative behavior (dra) on the on-task behaviors of deaf and hard of hearing st...

2012
Geoffrey B. Duggan Hilary Johnson Beate Grawemeyer Geoffrey Duggan

To inform the design of security policy, task models of password behaviour were constructed for different user groups – Computer Scientists, Administrative Staff and Students. These models identified internal and external constraints on user behaviour and the goals for password use within each group. Data were drawn from interviews and diaries of password use. Analyses indicated password securi...

2012
Geoffrey B. Duggan Hilary Johnson Beate Grawemeyer Geoffrey Duggan

To inform the design of security policy, task models of password behaviour were constructed for different user groups – Computer Scientists, Administrative Staff and Students. These models identified internal and external constraints on user behaviour and the goals for password use within each group. Data were drawn from interviews and diaries of password use. Analyses indicated password securi...

Journal: :I. J. Network Security 2009
M. Razvi Doomun K. M. S. Soyjaudah

With the widespread growth in applications for resourcelimited Wireless Sensor Networks (WSN), the need for reliable and efficient security mechanisms for them has increased manifold but its implementation is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography Algorithms for WSNs. In this paper, two potent...

2008
Prabhjot Kaur Anupama Kaushik

The current generation of IP, version 4 (IPv4), has been in use for more than 20 years since its inception in 1980 and has supported the Internet's rapid growth during that time. IPv4 has proven to be robust, easily implemented and interoperable. This is a tribute to its initial design. However, the current Internet has grown much bigger than was anticipated. The Internet Engineering Task Force...

2010
Aaron D. Jaggard Catherine A. Meadows Michael W. Mislove Roberto Segala

Task-structured probabilistic input/output automata (taskPIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framework for the universal composability paradigms of protocol security. One of their advantages is that that they allow one to distinguish high-level nondeterminism that can affect the outcome of the protocol, from low-level choices...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید