-
3
-
-
0043232732
-
Users are not the enemy: Why users compromise security mechanisms and how to take remedial measures
-
A. Adams, and M.A. Sasse Users are not the enemy: why users compromise security mechanisms and how to take remedial measures Communications of the ACM 42 12 1999 40 46
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
9
-
-
80052862897
-
Rethinking the design of the Internet: The end-to-end arguments vs. the brave new world
-
M.S. Blumenthal, and D.D. Clark Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world ACM Transactions on Internet Technology 1 1 2001 70 109
-
(2001)
ACM Transactions on Internet Technology
, vol.1
, Issue.1
, pp. 70-109
-
-
Blumenthal, M.S.1
Clark, D.D.2
-
10
-
-
0003429117
-
Are passfaces more usable than passwords? a field trial investigation
-
S. McDonald Y. Waern G. Cockton Springer Berlin
-
S. Brostoff, and M.A. Sasse Are passfaces more usable than passwords? A field trial investigation S. McDonald Y. Waern G. Cockton People and Computers XIV - Usability or Else! Proceedings of HCI 2000 2000 Springer Berlin 405 424
-
(2000)
People and Computers XIV - Usability or Else! Proceedings of HCI 2000
, pp. 405-424
-
-
Brostoff, S.1
Sasse, M.A.2
-
12
-
-
19944387477
-
Two experiences designing for effective security
-
Pittsburgh, PA
-
de Paula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D.F., Ren, J., Rode, J.A., Silva Filho, R., 2005. Two Experiences Designing for Effective Security. Symposium on Usable Privacy and Security SOUPS 2005, Pittsburgh, PA.
-
(2005)
Symposium on Usable Privacy and Security SOUPS 2005
-
-
De Paula, R.1
Ding, X.2
Dourish, P.3
Nies, K.4
Pillet, B.5
Redmiles, D.F.6
Ren, J.7
Rode, J.A.8
Silva Filho, R.9
-
17
-
-
19944399587
-
Privacy, security...and risk and danger and secrecy and trust and identity and morality and power: Understanding collective information practices
-
Institute for Software Research, Irvine, CA
-
Dourish, P., Anderson, K., 2005. Privacy, security...and risk and danger and secrecy and trust and identity and morality and power: understanding collective information practices. Technical Report UCI-ISR-05-1, Institute for Software Research, Irvine, CA.
-
(2005)
Technical Report
, vol.UCI-ISR-05-1
-
-
Dourish, P.1
Anderson, K.2
-
20
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday, practical problem
-
P. Dourish, E. Grinter, J.D. de la Flor, and M. Joseph Security in the wild: user strategies for managing security as an everyday, practical problem Personal Ubiquitous Computing 8 6 2004 391 401
-
(2004)
Personal Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, E.2
De La Flor, J.D.3
Joseph, M.4
-
21
-
-
0031250107
-
Pulsar: An extensible tool for monitoring large Unix sites
-
R.A. Finkel Pulsar: an extensible tool for monitoring large Unix sites Software-Practice & Experience 27 10 1997 1163 1176
-
(1997)
Software-Practice & Experience
, vol.27
, Issue.10
, pp. 1163-1176
-
-
Finkel, R.A.1
-
22
-
-
0003222004
-
HTTP extensions for distributed authoring - WEBDAV
-
Internet Engineering Task Force February
-
Goland, Y., Whitehead, E., Faizi, A., Carter, S., Jensen, D., 1999. HTTP extensions for distributed authoring - WEBDAV. Internet Engineering Task Force, Internet Proposed Standard Request for Comments 2518, February.
-
(1999)
Internet Proposed Standard Request for Comments
, vol.2518
-
-
Goland, Y.1
Whitehead, E.2
Faizi, A.3
Carter, S.4
Jensen, D.5
-
29
-
-
0242528324
-
Creating an infrastructure for ubiquitous awareness
-
Kantor, M., Redmiles, D., 2001. Creating an infrastructure for ubiquitous awareness. Eighth IFIP TC 13 Conference on Human-Computer Interaction INTERACT 2001, Tokyo, Japan, pp. 431-438.
-
(2001)
Eighth IFIP TC 13 Conference on Human-Computer Interaction INTERACT 2001
, pp. 431-438
-
-
Kantor, M.1
Redmiles, D.2
-
31
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
R. Kemmerer, C. Meadows, and J. Millen Three systems for cryptographic protocol analysis Journal of Cryptology 7 2 1994 79 130
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
32
-
-
0001831248
-
Where are the missing masses? the sociology of a few mundane artifacts
-
W.E. Bijker J. Law MIT Press Cambridge, MA
-
B. Latour Where are the missing masses? the sociology of a few mundane artifacts W.E. Bijker J. Law Shaping Technology/Building Society 1992 MIT Press Cambridge, MA
-
(1992)
Shaping Technology/Building Society
-
-
Latour, B.1
-
36
-
-
0016555241
-
The protection of information in computer systems
-
J.H. Saltzer, and M.D. Schroeder The protection of information in computer systems Proceedings of the IEEE 63 9 1975 1278 1308
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
40
-
-
0003256112
-
Elvin has left the building: A publish/subscribe notification service with quenching
-
Brisbane, Australia
-
Segall, B., Arnold, D., 1997. Elvin has left the building: a publish/subscribe notification service with quenching. Proceedings of the AUUG'97, Brisbane, Australia.
-
(1997)
Proceedings of the AUUG'97
-
-
Segall, B.1
Arnold, D.2
-
41
-
-
0242357321
-
Detecting format string vulnerabilities with type qualifiers
-
Washington, DC
-
Shankar, U., Talwar, K., Foster, J.S., Wagner, D., 2002. Detecting format string vulnerabilities with type qualifiers. Proceedings of the 10th USENIX Security Symposium (USENIX'02), Washington, DC, pp. 201-220.
-
(2002)
Proceedings of the 10th USENIX Security Symposium (USENIX'02)
, pp. 201-220
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
48
-
-
84861301152
-
Listening in: Practices surrounding iTunes music sharing
-
G. van der Veer C. Gale ACM Portland, OR
-
A. Voida, R. Grinter, N. Ducheneaut, K. Edwards, and M. Newman Listening in: practices surrounding iTunes music sharing G. van der Veer C. Gale Proceedings of the ACM Conference on Human Factors in Computing Systems CHI 2005 2005 ACM Portland, OR
-
(2005)
Proceedings of the ACM Conference on Human Factors in Computing Systems CHI 2005
-
-
Voida, A.1
Grinter, R.2
Ducheneaut, N.3
Edwards, K.4
Newman, M.5
-
49
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
Wagner, D., Foster, J.S., Brewer, E.A., Aiken, A., 2000. A first step towards automated detection of buffer overrun vulnerabilities. Network and Distributed Systems Security Symposium.
-
(2000)
Network and Distributed Systems Security Symposium
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
|