메뉴 건너뛰기




Volumn 2, Issue 5, 2004, Pages 19-24

In search of usable security: Five lessons from the field

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION PROTECTION; PUBLIC-KEY INFRASTRUCTURE (PKI); USABILITY; USER SATISFACTION; WIRELESS NETWORKS;

EID: 12844272841     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2004.71     Document Type: Review
Times cited : (89)

References (14)
  • 1
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J.H. Saltzer and M.D. Schroeder, "The Protection of Information in Computer Systems," Proc. IEEE, vol. 63, no. 9, 1975, pp. 1278-1308.
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 2
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • Usenix Assoc.
    • A. Whitten and J.D. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," Proc. 8th Usenix Security Symp., Usenix Assoc., 1999, pp. 169-184.
    • (1999) Proc. 8th Usenix Security Symp. , pp. 169-184
    • Whitten, A.1    Tygar, J.D.2
  • 3
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
    • Dec.
    • A. Adams and M.A. Sasse, "Users Are Not the Enemy: Why Users Compromise Computer Security Mechanisms and How to Take Remedial Measures," Comm. ACM, vol. 42, Dec. 1999, pp. 40-46.
    • (1999) Comm. ACM , vol.42 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 4
    • 0038226921 scopus 로고    scopus 로고
    • Moving from the design of usable security technologies to the design of useful secure applications
    • ACM Press
    • D.K. Smetters and R.E. Grinter, "Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications," Proc. New Security Paradigms Workshop 02, ACM Press, 2002, pp. 82-89.
    • (2002) Proc. New Security Paradigms Workshop 02 , pp. 82-89
    • Smetters, D.K.1    Grinter, R.E.2
  • 6
    • 0038065851 scopus 로고    scopus 로고
    • PPP EAP TLS authentication protocol (EAP-TLS)
    • Oct.
    • B. Aboba and D. Simon, "PPP EAP TLS Authentication Protocol (EAP-TLS)," IETF RFC 2716, Oct. 1999; www.ietf.org/rfc/rfc2716.txt.
    • (1999) IETF RFC , vol.2716
    • Aboba, B.1    Simon, D.2
  • 9
    • 85084163516 scopus 로고    scopus 로고
    • Network-in-a-box: How to set up a secure wireless network in under a minute
    • Usenix Assoc.
    • D. Balfanz et al., "Network-in-a-Box: How to Set up a Secure Wireless Network in Under a Minute," Proc. 13th Usenix Security Symp., Usenix Assoc., 2004, pp. 207-221.
    • (2004) Proc. 13th Usenix Security Symp. , pp. 207-221
    • Balfanz, D.1
  • 13
  • 14
    • 84882980040 scopus 로고    scopus 로고
    • Plug-and-play PKI: A PKI your mother can use
    • Usenix Assoc.
    • P. Gutmann, "Plug-and-Play PKI: A PKI Your Mother Can Use," Proc. 12th Usenix Security Symp., Usenix Assoc., 2003. pp. 45-58.
    • (2003) Proc. 12th Usenix Security Symp. , pp. 45-58
    • Gutmann, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.