Downloads provided by UsageCounts
Administration of protection mechanisms for large networked information enterprises is challenging due to large numbers of application instances resources and users, complex and dynamic business processes, and high (and always growing) volume of change because of the first two (large scale and dynamics). Significant portion of the complexity and the cost of security administration are due to the ineffective human computer interaction (HCI) models and interfaces employed in security administration. This talk introduces an upcoming project which goal is to develop better ways of representing cognitive models and find efficient HCI techniques to improve security administration for large-scale networked information enterprises.
security administration, usable security administration ;usable security; HOT Admin, usable security, administration
security administration, usable security administration ;usable security; HOT Admin, usable security, administration
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 2 | |
| downloads | 3 |

Views provided by UsageCounts
Downloads provided by UsageCounts