-
2
-
-
84944717964
-
Usable access control for the World Wide Web
-
IEEE Computer Society, Los Alamitos, CA, 08-12 December 2003, Las Vegas, NV
-
Balfanz, D., 2003. Usable access control for the World Wide Web. In: Proceedings of the 19th Annual Computer Security Applications Conference. IEEE Computer Society, Los Alamitos, CA, 08-12 December 2003, Las Vegas, NV, pp. 406-415.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference
, pp. 406-415
-
-
Balfanz, D.1
-
4
-
-
2342598277
-
Computer security impaired by legitimate users
-
D. Besnard, and B. Arief Computer security impaired by legitimate users Computers & Security 23 3 2004 253 264
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 253-264
-
-
Besnard, D.1
Arief, B.2
-
8
-
-
0038713945
-
Usability and privacy: A study of Kazaa P2P file-sharing
-
05-10 April 2003; Fort Lauderdale, Florida. ACM Press, New York, NY
-
Good, N.S., Krekelberg, A., 2003. Usability and privacy: a study of Kazaa P2P file-sharing. In: Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2003), 05-10 April 2003; Fort Lauderdale, Florida. ACM Press, New York, NY, pp. 137-144.
-
(2003)
Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2003)
, pp. 137-144
-
-
Good, N.S.1
Krekelberg, A.2
-
10
-
-
19944382652
-
A prototype user interface for coarse-grained desktop access control
-
Computer Science Department, Carnegie Mellon University, Pittsburgh, PA
-
Long, A.C., Moskowitz, C., Ganger, G., 2003. A prototype user interface for coarse-grained desktop access control. Technical Report CMU-CS-03-200, Computer Science Department, Carnegie Mellon University, Pittsburgh, PA.
-
(2003)
Technical Report
, vol.CMU-CS-03-200
-
-
Long, A.C.1
Moskowitz, C.2
Ganger, G.3
-
11
-
-
19944388751
-
-
Microsoft Corporation, 2005a. Best practices for permissions and user rights. Available at http://www.microsoft.com/resources/documentation/ windowsserv/2003/standard/proddocs/en-us/sag_SEconceptsImpACBP.asp.
-
(2005)
Best Practices for Permissions and User Rights
-
-
-
13
-
-
0022717774
-
A discrete control model of operator function: A methodology for information display design
-
C.M. Mitchell, and R.A. Miller A discrete control model of operator function: a methodology for information display design IEEE Transactions on Systems, Man, and Cybernetics SMC-16 3 1986 343 357
-
(1986)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.SMC-16
, Issue.3
, pp. 343-357
-
-
Mitchell, C.M.1
Miller, R.A.2
-
16
-
-
0005365039
-
Thea: A technique for human error assessment early in design
-
IOS Press, Amsterdam, 09-13 July 2001, Tokyo, Japan
-
Pocock, S., Harrison, M., Wright, P., Johnson, P., 2001. Thea: a technique for human error assessment early in design. In: Proceedings of Eighth IFIP TC.13 Conference on Human-computer Interaction (INTERACT'01). IOS Press, Amsterdam, 09-13 July 2001, Tokyo, Japan, pp. 247-254.
-
(2001)
Proceedings of Eighth IFIP TC.13 Conference on Human-computer Interaction (INTERACT'01)
, pp. 247-254
-
-
Pocock, S.1
Harrison, M.2
Wright, P.3
Johnson, P.4
-
17
-
-
0004223940
-
-
Cambridge University Press Cambridge, UK
-
J. Reason Human Error 1990 Cambridge University Press Cambridge, UK
-
(1990)
Human Error
-
-
Reason, J.1
-
18
-
-
84948983013
-
Access control for active spaces
-
IEEE Computer Society, Los Alamitos, CA, 09-13 December 2002, Las Vegas, NV
-
Sampemane, G., Naldurg, P., Campbell, R.H., 2002. Access control for active spaces. In: Proceedings of the 18th Annual Computer Security Applications Conference. IEEE Computer Society, Los Alamitos, CA, 09-13 December 2002, Las Vegas, NV, pp. 343-352.
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference
, pp. 343-352
-
-
Sampemane, G.1
Naldurg, P.2
Campbell, R.H.3
-
20
-
-
19944402704
-
-
Personal communication
-
Smith, R., 2004. Personal communication.
-
(2004)
-
-
Smith, R.1
-
22
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
USENIX Association, Berkeley, California, 23-26 August 1999, Washington, DC
-
Whitten, A., Tygar, J., 1999. Why Johnny can't encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the Eighth USENIX Security Symposium. USENIX Association, Berkeley, California, 23-26 August 1999, Washington, DC, pp. 169-184.
-
(1999)
Proceedings of the Eighth USENIX Security Symposium
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.2
-
23
-
-
29244480738
-
Safe staging for computer security
-
Fort Lauderdale, Florida
-
Whitten, A., Tygar, J., 2003. Safe staging for computer security. Presented at the Workshop on Human-Computer Interaction and Security Systems, part of ACM Conference on Human Factors in Computing Systems (CHI 2003), Fort Lauderdale, Florida.
-
(2003)
Workshop on Human-computer Interaction and Security Systems, Part of ACM Conference on Human Factors in Computing Systems (CHI 2003)
-
-
Whitten, A.1
Tygar, J.2
-
25
-
-
0010001456
-
Paradigms for intelligent decision support
-
E. Hollnagel G. Mancini D.D. Woods Springer Berlin
-
D.D. Woods Paradigms for intelligent decision support E. Hollnagel G. Mancini D.D. Woods Intelligent Decision Support in Process Environments 1985 Springer Berlin 153 173
-
(1985)
Intelligent Decision Support in Process Environments
, pp. 153-173
-
-
Woods, D.D.1
-
26
-
-
0002446449
-
Cognitive systems engineering
-
M. Helander first ed Elsevier Science Publishers B.V. Amsterdam, The Netherlands
-
D.D. Woods, and E.M. Roth Cognitive systems engineering M. Helander Handbook of Human-Computer Interaction first ed 1988 Elsevier Science Publishers B.V. Amsterdam, The Netherlands 3 43 (Chapter 1)
-
(1988)
Handbook of Human-Computer Interaction
, pp. 3-43
-
-
Woods, D.D.1
Roth, E.M.2
-
27
-
-
84944056366
-
User interaction design for secure systems
-
Information and Communications Security, Fourth International Conference, ICICS 2002, Singapore Springer, New York, NY, 09-12 December 2002
-
Yee, K., 2002. User interaction design for secure systems. In: Information and Communications Security, Fourth International Conference, ICICS 2002, Singapore. Lecture Notes in Computer Science, vol. 2513. Springer, New York, NY, 09-12 December 2002, pp. 278-290.
-
(2002)
Lecture Notes in Computer Science
, vol.2513
, pp. 278-290
-
-
Yee, K.1
-
28
-
-
0030189574
-
A representational analysis of relational information
-
J. Zhang A representational analysis of relational information International Journal of Human-Computer Studies 45 1 1996 59 74
-
(1996)
International Journal of Human-Computer Studies
, vol.45
, Issue.1
, pp. 59-74
-
-
Zhang, J.1
-
29
-
-
0031116378
-
The nature of external representations in problem solving
-
J. Zhang The nature of external representations in problem solving Cognitive Science 21 2 1997 179 217
-
(1997)
Cognitive Science
, vol.21
, Issue.2
, pp. 179-217
-
-
Zhang, J.1
-
30
-
-
0002614978
-
Representations in distributed cognitive tasks
-
J. Zhang, and D.A. Norman Representations in distributed cognitive tasks Cognitive Science 18 1 1994 87 122
-
(1994)
Cognitive Science
, vol.18
, Issue.1
, pp. 87-122
-
-
Zhang, J.1
Norman, D.A.2
-
31
-
-
84926001904
-
User-centered security
-
17-20 September 1996. ACM Press, New York, NY, Lake Arrowhead, CA
-
Zurko, M.E., Simon, R.T., 1996. User-centered security. In: Proceedings of Workshop on New Security Paradigms, 17-20 September 1996. ACM Press, New York, NY, Lake Arrowhead, CA, pp. 27-33.
-
(1996)
Proceedings of Workshop on New Security Paradigms
, pp. 27-33
-
-
Zurko, M.E.1
Simon, R.T.2
-
32
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
9-12 May 1999. IEEE Computer Security Press, Los Alamitos, CA, Berkeley, California
-
Zurko, M.E., Simon, R., Sanfilippo, T., 1999. A user-centered, modular authorization service built on an RBAC foundation. In: Proceedings 1999, IEEE Symposium on Security and Privacy, 9-12 May 1999. IEEE Computer Security Press, Los Alamitos, CA, Berkeley, California, pp. 57-71.
-
(1999)
Proceedings 1999, IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.E.1
Simon, R.2
Sanfilippo, T.3
|