메뉴 건너뛰기




Volumn , Issue , 2002, Pages 75-81

An approach to usable security based on event monitoring and visualization

Author keywords

Event monitoring; Mental models; Usability; Visualization

Indexed keywords

DATA PRIVACY; MATHEMATICAL MODELS; SECURITY SYSTEMS; USABILITY ENGINEERING; VISUALIZATION;

EID: 0242696305     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/844115.844116     Document Type: Conference Paper
Times cited : (36)

References (51)
  • 1
    • 84869462085 scopus 로고    scopus 로고
    • Privacy critics: UI components to safeguard users' privacy
    • (Short Papers)
    • Ackerman, M. and Cranor, L. 1999. Privacy Critics: UI Components to Safeguard Users' Privacy. Adjunct Proceedings of CHI'99 (Short Papers), 258-259.
    • Adjunct Proceedings of CHI'99 , pp. 258-259
    • Ackerman, M.1    Cranor, L.2
  • 2
    • 84883892066 scopus 로고    scopus 로고
    • Privacy in E-commerce: Examining user scenarios and privacy preferences
    • ACM
    • Ackerman, M., Cranor, L., and Reagle, J. 1999. Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. ACM Conf. on Electronic Commerce, 1-8. ACM
    • (1999) ACM Conf. on Electronic Commerce , pp. 1-8
    • Ackerman, M.1    Cranor, L.2    Reagle, J.3
  • 3
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise security mechanisms and how to take remedial measures
    • Adams, A. and Sasse, M.A. 1999. Users Are Not The Enemy: Why users compromise security mechanisms and how to take remedial measures. Comm. ACM, 42(12), 40-46.
    • (1999) Comm. ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 4
    • 0242444871 scopus 로고    scopus 로고
    • Making passwords secure and usable
    • In Thimbleby, H. O'Connaill, B., and Thomas, P. (eds); Springer
    • Adams, A., Sasse, M.A., and Lunt, P. 1997. Making Passwords Secure and Usable. In Thimbleby, H. O'Connaill, B., and Thomas, P. (eds), People and Computers XII: Proceedings of HCI'97, 1-19, Springer.
    • (1997) People and Computers XII: Proceedings of HCI'97 , pp. 1-19
    • Adams, A.1    Sasse, M.A.2    Lunt, P.3
  • 5
    • 0020777709 scopus 로고
    • Security kernel design and implementation: An introduction
    • Ames, S., Gasser, M., and Schell, R. 1983. Security Kernel Design and Implementation: An Introduction. IEEE Computer, 16, 7, 14-22.
    • (1983) IEEE Computer , vol.16 , Issue.7 , pp. 14-22
    • Ames, S.1    Gasser, M.2    Schell, R.3
  • 9
    • 80052862897 scopus 로고    scopus 로고
    • Rethinking the design of the internet: The end-to-end arguments vs. the brave new world
    • Blumenthal, M. and Clark, D. 2001. Rethinking the Design of the Internet: the end-to-end arguments vs. the brave new world. ACM Trans. Internet Technology, 1(1), 70-109.
    • (2001) ACM Trans. Internet Technology , vol.1 , Issue.1 , pp. 70-109
    • Blumenthal, M.1    Clark, D.2
  • 10
    • 0003429117 scopus 로고    scopus 로고
    • Are passfaces more usable than passwords? A field trial investigation
    • In S. McDonald, Y. Waern & G. Cockton (Eds.); Springer
    • Brostoff, S. and Sasse, M.A. 2000. Are Passfaces more usable than passwords? A field trial investigation. In S. McDonald, Y. Waern & G. Cockton (Eds.): People and Computers XIV - Usability or Else! Proceedings of HCI 2000, 405-424. Springer.
    • (2000) People and Computers XIV - Usability Or Else! Proceedings of HCI 2000 , pp. 405-424
    • Brostoff, S.1    Sasse, M.A.2
  • 11
    • 0001655450 scopus 로고    scopus 로고
    • Design and evaluation of a wide-area notification service
    • Carzaniga, A., Rosenblum, D., and Wolf, A. 2001. Design and Evaluation of a Wide-Area Notification Service. ACM Trans. Computer Systems, 19(3), 332-383.
    • (2001) ACM Trans. Computer Systems , vol.19 , Issue.3 , pp. 332-383
    • Carzaniga, A.1    Rosenblum, D.2    Wolf, A.3
  • 13
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Denning, D. 1987. An Intrusion-Detection Model. IEEE Trans. Software Engineering, 13(2), 222-232.
    • (1987) IEEE Trans. Software Engineering , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 14
    • 0032275545 scopus 로고    scopus 로고
    • Flexible meta access-control for collaborative applications primitives for building flexible groupware systems
    • ACM
    • Dewan, P. and Shen, H. 1998. Flexible Meta Access-Control for Collaborative Applications Primitives for Building Flexible Groupware Systems. Proceedings of ACM Conference on Computer-Supported Cooperative Work CSCW'98, 247-256. ACM.
    • (1998) Proceedings of ACM Conference on Computer-Supported Cooperative Work CSCW'98 , pp. 247-256
    • Dewan, P.1    Shen, H.2
  • 19
    • 0242528320 scopus 로고    scopus 로고
    • A visual virtual machine for Java programs: Exploration and early experiences
    • (San Francisco, CA.)
    • Dourish, P. and Byttner, J. 20002. A Visual Virtual Machine for Java Programs: Exploration and Early Experiences. Proc. ICDMS Workshop on Visual Computing (San Francisco, CA.)
    • (2002) Proc. ICDMS Workshop on Visual Computing
    • Dourish, P.1    Byttner, J.2
  • 20
    • 0031250107 scopus 로고    scopus 로고
    • Pulsar: An extensible tool for monitoring large UNIX sites
    • Finkel, R. 1997. Pulsar: An Extensible Tool for Monitoring Large UNIX Sites. Software Practice and Experience, 27(10). 1163-1176.
    • (1997) Software Practice and Experience , vol.27 , Issue.10 , pp. 1163-1176
    • Finkel, R.1
  • 22
    • 84959028319 scopus 로고
    • Real-time groupware as a distributed system: Concurrency control and its effect on the interface
    • ACM
    • Greenberg, S and Marwood, D. 1994. Real-Time Groupware as a Distributed System: Concurrency Control and its Effect on the Interface. Proc. ACM Conf. Computer-Supported Cooperative Work CSCW'94, 207-218. ACM.
    • (1994) Proc. ACM Conf. Computer-Supported Cooperative Work CSCW'94 , pp. 207-218
    • Greenberg, S.1    Marwood, D.2
  • 23
    • 0033489646 scopus 로고    scopus 로고
    • Security service level agreements: Quantifiable security for the enterprise?
    • (Ontario, Canada); ACM
    • Henning, R. 2000. Security Service Level Agreements: Quantifiable Security for the Enterprise? Proc. New Security Paradigm Workshop (Ontario, Canada), 54-60. ACM.
    • (2000) Proc. New Security Paradigm Workshop , pp. 54-60
    • Henning, R.1
  • 28
    • 0004253615 scopus 로고
    • The codebreakers
    • Macmillan
    • Kahn, D. 1967. The Codebreakers. Macmillan.
    • (1967)
    • Kahn, D.1
  • 31
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • Kemmerer, R., Meadows, C., and Millen, J. 1994. Three Systems for Cryptographic Protocol Analysis. Journal of Cryptology, 7(2), 79-130.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 32
    • 0001814046 scopus 로고
    • The contemporary theory of metaphor
    • In Ortony (ed); Cambridge University Press
    • Lakoff, G. 1992. The Contemporary Theory of Metaphor. In Ortony (ed), Metaphor and Thought (2nd Edition). Cambridge University Press.
    • (1992) Metaphor and Thought (2nd Edition)
    • Lakoff, G.1
  • 33
    • 0023866666 scopus 로고
    • A prototype real-time intrusion-detection export system
    • New York: IEEE
    • Lunt, T. and Jagannathan. 1988. A Prototype Real-Time Intrusion-Detection Export System. Proc. IEEE Symposium on Security and Privacy, 59-66. New York: IEEE.
    • (1988) Proc. IEEE Symposium on Security and Privacy , pp. 59-66
    • Lunt, T.1    Jagannathan2
  • 38
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J. and Schroeder, M. 1975. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9), 1278-1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 41
    • 0032218228 scopus 로고    scopus 로고
    • Cryptanalysis of microsoft's point-to-point tunnelling protocol (PPTP)
    • New York: ACM
    • Schneier, B. and Mudge. 1998. Cryptanalysis of Microsoft's Point-to-Point Tunnelling Protocol (PPTP). Proc. ACM Conf. Computer and Communication Security, 132-141. New York: ACM.
    • (1998) Proc. ACM Conf. Computer and Communication Security , pp. 132-141
    • Schneier, B.1    Mudge2
  • 42
    • 0002762937 scopus 로고
    • Phenomenology and the evolution of intuition
    • In Gentner and Stevens (eds); Hillsdale, NJ: Laurence Erlbaum
    • di Sessa, A. 1983. Phenomenology and the Evolution of Intuition. In Gentner and Stevens (eds), Mental Models. Hillsdale, NJ: Laurence Erlbaum.
    • (1983) Mental Models
    • Di Sessa, A.1
  • 45
    • 26344464374 scopus 로고    scopus 로고
    • Lessons learned using with notification servers to support application awareness
    • Department of Information and Computer Science, University of California, Irvine, Technical Report #02-11
    • de Souza, C., Basaveswara, S., Redmiles, D. 2002. Lessons Learned Using with Notification Servers to Support Application Awareness, Department of Information and Computer Science, University of California, Irvine, Technical Report #02-11.
    • (2002)
    • De Souza, C.1    Basaveswara, S.2    Redmiles, D.3
  • 49
    • 0242708745 scopus 로고    scopus 로고
    • Pretty good persuasion: A first step towards effective password security for the real world
    • (Sept. 10-13, Cloudcroft, NM); ACM Press
    • Weirich, D. and Sasse, M.A. 2001. Pretty Good Persuasion: A first step towards effective password security for the Real World. Proceedings of the New Security Paradigms Workshop 2001 (Sept. 10-13, Cloudcroft, NM), 137-143. ACM Press.
    • (2001) Proceedings of the New Security Paradigms Workshop 2001 , pp. 137-143
    • Weirich, D.1    Sasse, M.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.