메뉴 건너뛰기




Volumn , Issue , 2004, Pages 52-61

Know why your access was denied: Regulating feedback for usable security

Author keywords

Access control; Feedback; Policy protection; Privacy; Security; Usability

Indexed keywords

ACCESS CONTROLS; HUMAN FACTORS; POLICY PROTECTION; PRIVACY; SYSTEM USABILITY;

EID: 14844322854     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (34)

References (26)
  • 1
    • 0030246260 scopus 로고    scopus 로고
    • Improving the variable ordering of OBDDs is NP-complete
    • Sept.
    • Beate Bollig and Ingo Wegener. Improving the variable ordering of OBDDs is NP-complete. IEEE Trans. on Computers, 45(9):993-1001, Sept. 1996.
    • (1996) IEEE Trans. on Computers , vol.45 , Issue.9 , pp. 993-1001
    • Bollig, B.1    Wegener, I.2
  • 3
    • 0036311802 scopus 로고    scopus 로고
    • A uniform framework for regulating service access and information release on the web
    • Piero A. Bonatti and Pierangela Samarati. A uniform framework for regulating service access and information release on the Web. Journal of Computer Security, 10(3):241-271, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-271
    • Bonatti, P.A.1    Samarati, P.2
  • 4
    • 0026175133 scopus 로고
    • Heuristics to compute variable orderings for efficient manipulation of ordered binary decision diagrams
    • San Francisco, CA, June
    • Kenneth M. Butler, Don E. Ross, Rohit Kapur, and M.Ray Mercer. Heuristics to compute variable orderings for efficient manipulation of ordered binary decision diagrams. In Proceedings of the 28th conference on ACM/IEEE Design Automation, pages 417-420, San Francisco, CA, June 1991.
    • (1991) Proceedings of the 28th Conference on ACM/IEEE Design Automation , pp. 417-420
    • Butler, K.M.1    Ross, D.E.2    Kapur, R.3    Mercer, M.R.4
  • 7
    • 0027047925 scopus 로고
    • On variable ordering of binary decision diagrams for the application of multi-level logic synthesis
    • Amsterdam, February. IEEE Computer Society Press
    • Masahiro Fujita, Yusuke Matsunaga, and Taeko Kakuda. On variable ordering of binary decision diagrams for the application of multi-level logic synthesis. In Proceedings of the conference on European Design Automation, pages 50-54, Amsterdam, February 1991. IEEE Computer Society Press.
    • (1991) Proceedings of the Conference on European Design Automation , pp. 50-54
    • Fujita, M.1    Matsunaga, Y.2    Kakuda, T.3
  • 9
    • 84958059004 scopus 로고    scopus 로고
    • Exponential lower bounds on the size of OBDDs representing integer divistion
    • Takashi Horiyama and Shuzo Yajima. Exponential lower bounds on the size of OBDDs representing integer divistion. In Proceedings ISAAC, pages 163-172, 1997.
    • (1997) Proceedings ISAAC , pp. 163-172
    • Horiyama, T.1    Yajima, S.2
  • 10
    • 33845622734 scopus 로고    scopus 로고
    • The interactive workspaces project: Experiences with ubiquitous computing environments
    • Apr-Jun
    • Brad Johanson, Armando Fox, and Terry Winograd. The Interactive Workspaces project: Experiences with ubiquitous computing environments. IEEE Pervasive Computing magazine, 1(2):67-74, Apr-Jun 2002.
    • (2002) IEEE Pervasive Computing Magazine , vol.1 , Issue.2 , pp. 67-74
    • Johanson, B.1    Fox, A.2    Winograd, T.3
  • 11
    • 14844301984 scopus 로고    scopus 로고
    • Search techniques
    • Hossein Bidgoli, editor. Academic Press, San Diego, CA, aug
    • R.E. Korf. Search techniques. In Hossein Bidgoli, editor, Encyclopedia of Information Systems. Academic Press, San Diego, CA, aug 2002.
    • (2002) Encyclopedia of Information Systems
    • Korf, R.E.1
  • 12
    • 35048859338 scopus 로고    scopus 로고
    • Protecting security policies in ubiquitous environments using one-way functions
    • D.Hutter et al., editors, Security in Pervasive Computing 2003. Springer-Verlag, Heidelberg
    • Håkan Kvarnström, Hans Hedbom, and Erland Jonsson. Protecting security policies in ubiquitous environments using one-way functions. In D.Hutter et al., editors, Security in Pervasive Computing 2003, volume 2802 of LNCS, pages 71-85. Springer-Verlag, Heidelberg, 2003.
    • (2003) LNCS , vol.2802 , pp. 71-85
    • Kvarnström, H.1    Hedbom, H.2    Jonsson, E.3
  • 13
    • 0038220797 scopus 로고    scopus 로고
    • BuDDy - A binary decision diagram package
    • Technical University of Denmark
    • J. Lind-Nielsen. BuDDy - a binary decision diagram package. Technical Report IT-TR: 1999-028, Technical University of Denmark, 1999.
    • (1999) Technical Report IT-TR: 1999-028
    • Lind-Nielsen, J.1
  • 14
    • 0003498073 scopus 로고
    • On approximation preserving reductions: Complete problems and robust measures
    • University of Helsinki, Dept. of Computer Science
    • P. Orponen and H. Mannila. On approximation preserving reductions: Complete problems and robust measures. Technical Report C-1987-28, University of Helsinki, Dept. of Computer Science, 1987.
    • (1987) Technical Report , vol.C-1987-28
    • Orponen, P.1    Mannila, H.2
  • 16
    • 0022769976 scopus 로고
    • Graph-based algorithms for boolean function manipulation
    • R.E.Bryant. Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, C-35(8):677-691, 1986.
    • (1986) IEEE Transactions on Computers , vol.C-35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 18
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 20
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • September
    • Mark Weiser. The computer for the 21st century. Scientific American, pages 94-104, September 1991.
    • (1991) Scientific American , pp. 94-104
    • Weiser, M.1
  • 24
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • Ting Yu, Marianne Winslett, and Kent E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur., 6(1):l-42, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.1
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3
  • 25
    • 0038200710 scopus 로고    scopus 로고
    • Learning-assisted automated planning
    • Terry Zimmerman and Subbarao Kambhampati. Learning-assisted automated planning. AI Magazine, 24(2):73-96, 2003.
    • (2003) AI Magazine , vol.24 , Issue.2 , pp. 73-96
    • Zimmerman, T.1    Kambhampati, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.