Desktop Security as a Three-dimensional Problem

نویسندگان

  • George R S Weir
  • Nikolaos Zonidis
چکیده

In this paper we argue against viewing computer desktop security solely as a technical issue. Instead, we propose a perspective that combines three related dimensions: technical infrastructure, usability and user engagement. In this light, we suggest that a viable approach to desktop security should embrace these three key dimensions of the end-user context. An example desktop application is described that has been engineered to embody these dimensions in support of the desktop user.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Three Dimensional Thermal Shock Problem in Magneto-Thermoelastic Orthotropic Medium

The paper is concerned with the study of magneto-thermoelastic interactions in three dimensional thermoelastic medium under the purview of three-phase-lag model of generalized thermoelasticity. The medium under consideration is assumed to be homogeneous orthotropic medium. The fundamental equations of the three-dimensional problem of generalized thermoelasticity are obtained as a vector-matrix ...

متن کامل

Apiary: Easy-to-Use Desktop Application Fault Containment on Commodity Operating Systems

Desktop computers are often compromised by the interaction of untrusted data and buggy software. To address this problem, we present Apiary, a system that provides transparent application fault containment while retaining the ease of use of a traditional integrated desktop environment. Apiary accomplishes this with three key mechanisms. It isolates applications in containers that integrate in a...

متن کامل

Evaluation of Desktop Free/open Source Gis Software Based on Functional and Non-functional Capabilities

Original scientific paper In recent years information technology has grown very rapidly. In the context of GIS, Free/Open source concept and also three-dimensional implementation have had more development too. The usage of these types of software is increasingly growing because of reasons such as security, open standards, vendor independence. In this regard, one of the most significant problems...

متن کامل

On Security Protocols for Desktop Sharing

In this paper we examine security protocols employed in a number of tools for desktop sharing. These tools allow one user to see and interact with the desktop of another user, i.e. transmitting the contents of one computer’s logical display to another place, including user interaction. In contrast to remote sessions, with desktop sharing, the access to the machine is shared, e.g. for interactiv...

متن کامل

Kinematic Mapping and Forward Kinematic Problem of a 5-DOF (3T2R) Parallel Mechanism with Identical Limb Structures

The main objective of this paper is to study the Euclidean displacement of a 5-DOF parallel mechanism performing three translation and two independent rotations with identical limb structures-recently revealed by performing the type synthesis-in a higher dimensional projective space, rather than relying on classical recipes, such as Cartesian coordinates and Euler angles. In this paper, Study's...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005