-
1
-
-
84869462085
-
Privacy critics: UI components to safeguard users' privacy
-
(Short Papers)
-
Ackerman, M. and Cranor, L. 1999. Privacy Critics: UI Components to Safeguard Users' Privacy. Adjunct Proceedings of CHI'99 (Short Papers), 258-259.
-
Adjunct Proceedings of CHI'99
, pp. 258-259
-
-
Ackerman, M.1
Cranor, L.2
-
2
-
-
84883892066
-
Privacy in E-commerce: Examining user scenarios and privacy preferences
-
ACM
-
Ackerman, M., Cranor, L., and Reagle, J. 1999. Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. ACM Conf. on Electronic Commerce, 1-8. ACM
-
(1999)
ACM Conf. on Electronic Commerce
, pp. 1-8
-
-
Ackerman, M.1
Cranor, L.2
Reagle, J.3
-
3
-
-
0043232732
-
Users are not the enemy: Why users compromise security mechanisms and how to take remedial measures
-
Adams, A. and Sasse, M.A. 1999. Users Are Not The Enemy: Why users compromise security mechanisms and how to take remedial measures. Comm. ACM, 42(12), 40-46.
-
(1999)
Comm. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
4
-
-
0242444871
-
Making passwords secure and usable
-
In Thimbleby, H. O'Connaill, B., and Thomas, P. (eds); Springer
-
Adams, A., Sasse, M.A., and Lunt, P. 1997. Making Passwords Secure and Usable. In Thimbleby, H. O'Connaill, B., and Thomas, P. (eds), People and Computers XII: Proceedings of HCI'97, 1-19, Springer.
-
(1997)
People and Computers XII: Proceedings of HCI'97
, pp. 1-19
-
-
Adams, A.1
Sasse, M.A.2
Lunt, P.3
-
5
-
-
0020777709
-
Security kernel design and implementation: An introduction
-
Ames, S., Gasser, M., and Schell, R. 1983. Security Kernel Design and Implementation: An Introduction. IEEE Computer, 16, 7, 14-22.
-
(1983)
IEEE Computer
, vol.16
, Issue.7
, pp. 14-22
-
-
Ames, S.1
Gasser, M.2
Schell, R.3
-
8
-
-
0034447846
-
Operating system enhancements to prevent the misuse of system calls
-
New York: ACM
-
Bernaschi, M., Gabrielli, E., and Mancini, L. 2000. Operating System Enhancements to Prevent the Misuse of System Calls. Proc. ACM Conf. Computer and Communication Security, 174-183. New York: ACM.
-
(2000)
Proc. ACM Conf. Computer and Communication Security
, pp. 174-183
-
-
Bernaschi, M.1
Gabrielli, E.2
Mancini, L.3
-
9
-
-
80052862897
-
Rethinking the design of the internet: The end-to-end arguments vs. the brave new world
-
Blumenthal, M. and Clark, D. 2001. Rethinking the Design of the Internet: the end-to-end arguments vs. the brave new world. ACM Trans. Internet Technology, 1(1), 70-109.
-
(2001)
ACM Trans. Internet Technology
, vol.1
, Issue.1
, pp. 70-109
-
-
Blumenthal, M.1
Clark, D.2
-
10
-
-
0003429117
-
Are passfaces more usable than passwords? A field trial investigation
-
In S. McDonald, Y. Waern & G. Cockton (Eds.); Springer
-
Brostoff, S. and Sasse, M.A. 2000. Are Passfaces more usable than passwords? A field trial investigation. In S. McDonald, Y. Waern & G. Cockton (Eds.): People and Computers XIV - Usability or Else! Proceedings of HCI 2000, 405-424. Springer.
-
(2000)
People and Computers XIV - Usability Or Else! Proceedings of HCI 2000
, pp. 405-424
-
-
Brostoff, S.1
Sasse, M.A.2
-
11
-
-
0001655450
-
Design and evaluation of a wide-area notification service
-
Carzaniga, A., Rosenblum, D., and Wolf, A. 2001. Design and Evaluation of a Wide-Area Notification Service. ACM Trans. Computer Systems, 19(3), 332-383.
-
(2001)
ACM Trans. Computer Systems
, vol.19
, Issue.3
, pp. 332-383
-
-
Carzaniga, A.1
Rosenblum, D.2
Wolf, A.3
-
12
-
-
0030615546
-
Automatic monitoring of software requirements
-
Cohen, D., Feather, M., Narayanaswamy, K., Fickas, S. 1997. Automatic monitoring of software requirements. Proceedings of the 1997 International Conference on Software Engineering, ICSE 97 (Boston, MA), 602-603.
-
(1997)
Proceedings of the 1997 International Conference on Software Engineering, ICSE 97 (Boston, MA)
, pp. 602-603
-
-
Cohen, D.1
Feather, M.2
Narayanaswamy, K.3
Fickas, S.4
-
13
-
-
0023294428
-
An intrusion-detection model
-
Denning, D. 1987. An Intrusion-Detection Model. IEEE Trans. Software Engineering, 13(2), 222-232.
-
(1987)
IEEE Trans. Software Engineering
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
14
-
-
0032275545
-
Flexible meta access-control for collaborative applications primitives for building flexible groupware systems
-
ACM
-
Dewan, P. and Shen, H. 1998. Flexible Meta Access-Control for Collaborative Applications Primitives for Building Flexible Groupware Systems. Proceedings of ACM Conference on Computer-Supported Cooperative Work CSCW'98, 247-256. ACM.
-
(1998)
Proceedings of ACM Conference on Computer-Supported Cooperative Work CSCW'98
, pp. 247-256
-
-
Dewan, P.1
Shen, H.2
-
19
-
-
0242528320
-
A visual virtual machine for Java programs: Exploration and early experiences
-
(San Francisco, CA.)
-
Dourish, P. and Byttner, J. 20002. A Visual Virtual Machine for Java Programs: Exploration and Early Experiences. Proc. ICDMS Workshop on Visual Computing (San Francisco, CA.)
-
(2002)
Proc. ICDMS Workshop on Visual Computing
-
-
Dourish, P.1
Byttner, J.2
-
20
-
-
0031250107
-
Pulsar: An extensible tool for monitoring large UNIX sites
-
Finkel, R. 1997. Pulsar: An Extensible Tool for Monitoring Large UNIX Sites. Software Practice and Experience, 27(10). 1163-1176.
-
(1997)
Software Practice and Experience
, vol.27
, Issue.10
, pp. 1163-1176
-
-
Finkel, R.1
-
22
-
-
84959028319
-
Real-time groupware as a distributed system: Concurrency control and its effect on the interface
-
ACM
-
Greenberg, S and Marwood, D. 1994. Real-Time Groupware as a Distributed System: Concurrency Control and its Effect on the Interface. Proc. ACM Conf. Computer-Supported Cooperative Work CSCW'94, 207-218. ACM.
-
(1994)
Proc. ACM Conf. Computer-Supported Cooperative Work CSCW'94
, pp. 207-218
-
-
Greenberg, S.1
Marwood, D.2
-
23
-
-
0033489646
-
Security service level agreements: Quantifiable security for the enterprise?
-
(Ontario, Canada); ACM
-
Henning, R. 2000. Security Service Level Agreements: Quantifiable Security for the Enterprise? Proc. New Security Paradigm Workshop (Ontario, Canada), 54-60. ACM.
-
(2000)
Proc. New Security Paradigm Workshop
, pp. 54-60
-
-
Henning, R.1
-
24
-
-
0031597159
-
An approach to large-scale collection of application usage data over the internet
-
IEEE Computer Society Press
-
Hilbert, D. and Redmiles, D. 1998. An Approach to Large-Scale Collection of Application Usage Data Over the Internet, Proceedings of the Twentieth International Conference on Software Engineering (ICSE '98), Kyoto, Japan, IEEE Computer Society Press, 136-145.
-
(1998)
Proceedings of the Twentieth International Conference on Software Engineering (ICSE '98), Kyoto, Japan
, pp. 136-145
-
-
Hilbert, D.1
Redmiles, D.2
-
28
-
-
0004253615
-
The codebreakers
-
Macmillan
-
Kahn, D. 1967. The Codebreakers. Macmillan.
-
(1967)
-
-
Kahn, D.1
-
29
-
-
0242528324
-
Creating an infrastructure for ubiquitous awareness
-
(Tokyo, Japan)
-
Kantor, M., Redmiles, D. 2001. Creating an Infrastructure for Ubiquitous Awareness, Eighth IFIP TC 13 Conference on Human-Computer Interaction INTERACT 2001 (Tokyo, Japan), 431-438.
-
(2001)
Eighth IFIP TC 13 Conference on Human-Computer Interaction INTERACT 2001
, pp. 431-438
-
-
Kantor, M.1
Redmiles, D.2
-
30
-
-
84947910726
-
Cryptanalytic attacks on pseudorandom number generators
-
Springer-Verlag
-
Kelsey, J., Schneier, B., Wagner, D., and Hall, C. 1998. Cryptanalytic Attacks on Pseudorandom Number Generators. Proc. Intl. Workshop on Fast Software Encryption, 168-188. Springer-Verlag.
-
(1998)
Proc. Intl. Workshop on Fast Software Encryption
, pp. 168-188
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
31
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Kemmerer, R., Meadows, C., and Millen, J. 1994. Three Systems for Cryptographic Protocol Analysis. Journal of Cryptology, 7(2), 79-130.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
32
-
-
0001814046
-
The contemporary theory of metaphor
-
In Ortony (ed); Cambridge University Press
-
Lakoff, G. 1992. The Contemporary Theory of Metaphor. In Ortony (ed), Metaphor and Thought (2nd Edition). Cambridge University Press.
-
(1992)
Metaphor and Thought (2nd Edition)
-
-
Lakoff, G.1
-
33
-
-
0023866666
-
A prototype real-time intrusion-detection export system
-
New York: IEEE
-
Lunt, T. and Jagannathan. 1988. A Prototype Real-Time Intrusion-Detection Export System. Proc. IEEE Symposium on Security and Privacy, 59-66. New York: IEEE.
-
(1988)
Proc. IEEE Symposium on Security and Privacy
, pp. 59-66
-
-
Lunt, T.1
Jagannathan2
-
36
-
-
0030405302
-
Visualizing the global topology of the MBone
-
(San Francisco, CA). New York: IEEE
-
Munzer, T., Hoffman, E., Claffy, K., and Fenner, B. 1996. Visualizing the Global Topology of the MBone. Proc. of the Symposium on Information Visualization (San Francisco, CA). New York: IEEE.
-
(1996)
Proc. of the Symposium on Information Visualization
-
-
Munzer, T.1
Hoffman, E.2
Claffy, K.3
Fenner, B.4
-
37
-
-
0242613119
-
Examining users' repertaoir of internet applications
-
In Sasse and Johnson (eds)
-
Rimmer, J., Wakeman, I., Sheeran, L., and Sasse, M.A. 1999. Examining Users' Repertaoir of Internet Applications. In Sasse and Johnson (eds), Human-Computer Interaction: Proceedings of Interact'99.
-
(1999)
Human-Computer Interaction: Proceedings of Interact'99
-
-
Rimmer, J.1
Wakeman, I.2
Sheeran, L.3
Sasse, M.A.4
-
38
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J. and Schroeder, M. 1975. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9), 1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
39
-
-
84976845043
-
End-to-end arguments in system design
-
Saltzer, J., Reed, D., and Clark, D. 1981. End-to-End Arguments in System Design. ACM Trans. Computer Systems, 2(4), 277-288.
-
(1981)
ACM Trans. Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.1
Reed, D.2
Clark, D.3
-
41
-
-
0032218228
-
Cryptanalysis of microsoft's point-to-point tunnelling protocol (PPTP)
-
New York: ACM
-
Schneier, B. and Mudge. 1998. Cryptanalysis of Microsoft's Point-to-Point Tunnelling Protocol (PPTP). Proc. ACM Conf. Computer and Communication Security, 132-141. New York: ACM.
-
(1998)
Proc. ACM Conf. Computer and Communication Security
, pp. 132-141
-
-
Schneier, B.1
Mudge2
-
42
-
-
0002762937
-
Phenomenology and the evolution of intuition
-
In Gentner and Stevens (eds); Hillsdale, NJ: Laurence Erlbaum
-
di Sessa, A. 1983. Phenomenology and the Evolution of Intuition. In Gentner and Stevens (eds), Mental Models. Hillsdale, NJ: Laurence Erlbaum.
-
(1983)
Mental Models
-
-
Di Sessa, A.1
-
45
-
-
26344464374
-
Lessons learned using with notification servers to support application awareness
-
Department of Information and Computer Science, University of California, Irvine, Technical Report #02-11
-
de Souza, C., Basaveswara, S., Redmiles, D. 2002. Lessons Learned Using with Notification Servers to Support Application Awareness, Department of Information and Computer Science, University of California, Irvine, Technical Report #02-11.
-
(2002)
-
-
De Souza, C.1
Basaveswara, S.2
Redmiles, D.3
-
48
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
Internet Society
-
Wagner, D., Foster, J., Brewer, E., and Aiken, A. 2000. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. Proc. Networked and Distributed Systems Security Symposium. Internet Society.
-
(2000)
Proc. Networked and Distributed Systems Security Symposium
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
-
49
-
-
0242708745
-
Pretty good persuasion: A first step towards effective password security for the real world
-
(Sept. 10-13, Cloudcroft, NM); ACM Press
-
Weirich, D. and Sasse, M.A. 2001. Pretty Good Persuasion: A first step towards effective password security for the Real World. Proceedings of the New Security Paradigms Workshop 2001 (Sept. 10-13, Cloudcroft, NM), 137-143. ACM Press.
-
(2001)
Proceedings of the New Security Paradigms Workshop 2001
, pp. 137-143
-
-
Weirich, D.1
Sasse, M.A.2
|