메뉴 건너뛰기




Volumn , Issue , 2001, Pages 41-50

Safe and sound: A safety-critical approach to security

Author keywords

[No Author keywords available]

Indexed keywords

HUMAN ENGINEERING; MATHEMATICAL MODELS; SECURITY SYSTEMS; SYSTEMS ANALYSIS;

EID: 0242708756     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (67)

References (24)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • December, 1999
    • Adams, A. and Sasse, M.A. (1999), Users are not the enemy, Communications of the ACM, Vol. 42, No. 12. December, 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.12
    • Adams, A.1    Sasse, M.A.2
  • 5
    • 0003400255 scopus 로고
    • Integrity constraints for secure computer systems
    • Tech. Rep. ESD-TR76-372, USAF Electronic Systems Division, Bedford, MA
    • Biba, K. (1977) Integrity Constraints for Secure Computer Systems. Tech. Rep. ESD-TR76-372, USAF Electronic Systems Division, Bedford, MA
    • (1977)
    • Biba, K.1
  • 7
    • 0031373072 scopus 로고    scopus 로고
    • Cognitive, associative and conventional passwords: Recall and guessing rates
    • Bunnell, J., Podd, J., Henderson, R., Napier, R., & Kennedy-Moffat, J. (1997). Cognitive, associative and conventional passwords: Recall and guessing rates. Computers and Security, 16(7), 629-641.
    • (1997) Computers and Security , vol.16 , Issue.7 , pp. 629-641
    • Bunnell, J.1    Podd, J.2    Henderson, R.3    Napier, R.4    Kennedy-Moffat, J.5
  • 10
    • 0041847762 scopus 로고
    • FIPS; Federal Information Processing Standards Publication. May 30
    • FIPS (1985) Password Usage. Federal Information Processing Standards Publication. May 30.
    • (1985) Password Usage
  • 11
    • 0021481768 scopus 로고
    • Pass-algorithms: A user validation scheme based on than knowledge of secret algorithms
    • Haskett, J. A. (1984). Pass-algorithms: a user validation scheme based on than knowledge of secret algorithms. Communications of the ACM, 27(8), 777-781.
    • (1984) Communications of the ACM , vol.27 , Issue.8 , pp. 777-781
    • Haskett, J.A.1
  • 12
    • 0242528415 scopus 로고
    • Personal communication
    • In Reason, J.; Cambridge University Press. Cambridge, UK
    • Hudson, P.T.W. (1988) Personal communication, In Reason, J. (1990) Human Error. Cambridge University Press. Cambridge, UK
    • (1988) Human Error
    • Hudson, P.T.W.1
  • 15
    • 0242444914 scopus 로고    scopus 로고
    • Laptop tieves usually not after data
    • Lemos, R (2000) Laptop thieves usually not after data. http://www.zdnet.com/zdnn/stories/news/0,4586,2629471,00.html
    • (2000)
    • Lemos, R.1
  • 17
    • 0242528416 scopus 로고    scopus 로고
    • Fingerprint authentication
    • (March)
    • Murrer, E. (1999). Fingerprint Authentication. Secure Computing (March) 26-30
    • (1999) Secure Computing , pp. 26-30
    • Murrer, E.1
  • 18
    • 0023995273 scopus 로고
    • Understanding the use of passwords
    • Menkus, B. (1988). Understanding the use of passwords. Computers and Security, 7(2), 132-136.
    • (1988) Computers and Security , vol.7 , Issue.2 , pp. 132-136
    • Menkus, B.1
  • 20
    • 0004223940 scopus 로고
    • Cambridge University Press. Cambridge, UK
    • Reason, J. (1990) Human Error. Cambridge University Press. Cambridge, UK
    • (1990) Human Error
    • Reason, J.1
  • 21
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link': A human-computer interaction approach to usable and effective security
    • Sasse, M. A., Brostoff, S. & Weirich, D. (2001), Transforming the 'weakest link': a human-computer interaction approach to usable and effective security. BT Technical Journal, 19 (3), 122-131. (Also at http://www.bt.com/bttj/)
    • (2001) BT Technical Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 23
    • 0028406329 scopus 로고
    • Pass sentence - A new approach to computer code
    • Spector, Y., & Ginzberg, J. (1994). Pass sentence - a new approach to computer code. Computers and Security, 13(2), 145-160.
    • (1994) Computers and Security , vol.13 , Issue.2 , pp. 145-160
    • Spector, Y.1    Ginzberg, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.