1.
|
People adopt security technologies and make security decisions based on their perceptions of what risks they have, and what things they can do to protect their devices an[...]
2024 | doctoral dissertations |
|
2.
|
Users are burdened with the task of configuring access control policies on many different application platforms used by mobile devices and social network sites. Many of [...]
2013 | doctoral dissertations |
|
3.
|
Web applications consume data from different inputs. Some of these inputs originate from untrusted sources, such as user inputs which will be rendered in browsers or brow[...]
2018 | doctoral dissertations |
|