Desktop Security as a Three-dimensional Problem
نویسندگان
چکیده
In this paper we argue against viewing computer desktop security solely as a technical issue. Instead, we propose a perspective that combines three related dimensions: technical infrastructure, usability and user engagement. In this light, we suggest that a viable approach to desktop security should embrace these three key dimensions of the end-user context. An example desktop application is described that has been engineered to embody these dimensions in support of the desktop user.
منابع مشابه
Three Dimensional Thermal Shock Problem in Magneto-Thermoelastic Orthotropic Medium
The paper is concerned with the study of magneto-thermoelastic interactions in three dimensional thermoelastic medium under the purview of three-phase-lag model of generalized thermoelasticity. The medium under consideration is assumed to be homogeneous orthotropic medium. The fundamental equations of the three-dimensional problem of generalized thermoelasticity are obtained as a vector-matrix ...
متن کاملApiary: Easy-to-Use Desktop Application Fault Containment on Commodity Operating Systems
Desktop computers are often compromised by the interaction of untrusted data and buggy software. To address this problem, we present Apiary, a system that provides transparent application fault containment while retaining the ease of use of a traditional integrated desktop environment. Apiary accomplishes this with three key mechanisms. It isolates applications in containers that integrate in a...
متن کاملEvaluation of Desktop Free/open Source Gis Software Based on Functional and Non-functional Capabilities
Original scientific paper In recent years information technology has grown very rapidly. In the context of GIS, Free/Open source concept and also three-dimensional implementation have had more development too. The usage of these types of software is increasingly growing because of reasons such as security, open standards, vendor independence. In this regard, one of the most significant problems...
متن کاملOn Security Protocols for Desktop Sharing
In this paper we examine security protocols employed in a number of tools for desktop sharing. These tools allow one user to see and interact with the desktop of another user, i.e. transmitting the contents of one computer’s logical display to another place, including user interaction. In contrast to remote sessions, with desktop sharing, the access to the machine is shared, e.g. for interactiv...
متن کاملKinematic Mapping and Forward Kinematic Problem of a 5-DOF (3T2R) Parallel Mechanism with Identical Limb Structures
The main objective of this paper is to study the Euclidean displacement of a 5-DOF parallel mechanism performing three translation and two independent rotations with identical limb structures-recently revealed by performing the type synthesis-in a higher dimensional projective space, rather than relying on classical recipes, such as Cartesian coordinates and Euler angles. In this paper, Study's...
متن کامل