-
1
-
-
0037362986
-
Implementing role based access controls using X.509 attribute certificates
-
Chadwick DW, Otenko A, Ball E. Implementing role based access controls using X.509 attribute certificates. IEEE Internet Computing, 2003; (March-April):62-69.
-
(2003)
IEEE Internet Computing
, Issue.MARCH-APRIL
, pp. 62-69
-
-
Chadwick, D.W.1
Otenko, A.2
Ball, E.3
-
2
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
IEEE Computer Press: Los Alamitos, CA
-
Zurko ME, Simon R, Sanfilippo T. A user-centered, modular authorization service built on an RBAC foundation. IEEE Symposium on Security and Privacy. IEEE Computer Press: Los Alamitos, CA, 1999; 57-71.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.E.1
Simon, R.2
Sanfilippo, T.3
-
3
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer JH, Schroeder MD. The protection of information in computer systems. Proceedings of IEEE 1975; 63(9):1278-1308.
-
(1975)
Proceedings of IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
4
-
-
0030086382
-
Role based access control models
-
Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role based access control models. IEEE Computer 1996; 29(2):38-43.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-43
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
7
-
-
28844459710
-
A Grid for particle physics-from testbed to production
-
Nottingham
-
Britton D, Clarke P, Coles J, Colling D, Doyle A, Fisher SM, Irving AC, Jensen J, McNab A, Newbold D. A Grid for particle physics-from testbed to production. U.K. e-Science All Hands Conference, Nottingham, 2004.
-
(2004)
U.K. E-Science All Hands Conference
-
-
Britton, D.1
Clarke, P.2
Coles, J.3
Colling, D.4
Doyle, A.5
Fisher, S.M.6
Irving, A.C.7
Jensen, J.8
McNab, A.9
Newbold, D.10
-
8
-
-
84944056366
-
User interaction design for secure systems
-
Deng R, Qing S, Bao F, Zhou J (eds.). Springer: Berlin
-
Yee K-P. User interaction design for secure systems. Proceedings of the 4th International Conference on Information and Communications Security (Lecture Notes in Computer Science, vol. 2513), Deng R, Qing S, Bao F, Zhou J (eds.). Springer: Berlin, 2002; 278-290. Available at: http://zesty.ca/sid.
-
(2002)
Proceedings of the 4th International Conference on Information and Communications Security (Lecture Notes in Computer Science)
, vol.2513
, pp. 278290
-
-
Yee, K.-P.1
-
9
-
-
12844271558
-
Aligning security and usability
-
Yee K-P. Aligning security and usability. IEEE Security and Privacy 2004; (Sept/Oct):48-55.
-
(2004)
IEEE Security and Privacy
, Issue.SEPT-OCT
, pp. 48-55
-
-
Yee, K.-P.1
-
12
-
-
0027850828
-
A mathematical model of the finding of usability problems
-
ACM Press: New York
-
Nielsen J, Landauer TK. A mathematical model of the finding of usability problems. INTERCHI '93. ACM Press: New York, 1993; 206-213.
-
(1993)
INTERCHI '93
, pp. 206-213
-
-
Nielsen, J.1
Landauer, T.K.2
-
14
-
-
0038343292
-
Why and when five test users aren't enough
-
Toulouse, 2001. Cépadèus Éditions
-
Woolrych A, Cockton G. Why and when five test users aren't enough. IHM-HCI2001. Toulouse, 2001. Cépadèus Éditions, 2001; 105-108.
-
(2001)
IHM-HCI2001
, pp. 105-108
-
-
Woolrych, A.1
Cockton, G.2
-
17
-
-
4544326494
-
Analysis of combinatorial user effect in international usability tests
-
Vienna, Austria. ACM Press: New York
-
Law EL-C, Hvannberg ET. Analysis of combinatorial user effect in international usability tests. CHI2004. Vienna, Austria. ACM Press: New York, 2004; 9-16.
-
(2004)
CHI2004
, pp. 9-16
-
-
Law, E.L.-C.1
Hvannberg, E.T.2
-
18
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
Washington
-
Whitten A, Tygar JD. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. 9th USENIX Security Symposium, Washington, 1999.
-
(1999)
9th USENIX Security Symposium
-
-
Whitten, A.1
Tygar, J.D.2
-
19
-
-
0002485160
-
Some observations on mental models
-
Gentner DA, Stevens AA (eds.). Lawrence Erlbaum Associates: Hillsdale, NJ
-
Norman D. Some observations on mental models. Mental Models, Gentner DA, Stevens AA (eds.). Lawrence Erlbaum Associates: Hillsdale, NJ, 1986.
-
(1986)
Mental Models
-
-
Norman, D.1
-
20
-
-
0011101935
-
Minimising conceptual baggage: Making choices about metaphor
-
Glasgow, 1994. Cambridge University Press: Cambridge
-
Anderson B, Smyth M, Knott RP, Bergan M, Bergan J, Alty JL. Minimising conceptual baggage: Making choices about metaphor. People and Computers IX, Glasgow, 1994. Cambridge University Press: Cambridge, 1994; 179-194.
-
(1994)
People and Computers IX
, pp. 179-194
-
-
Anderson, B.1
Smyth, M.2
Knott, R.P.3
Bergan, M.4
Bergan, J.5
Alty, J.L.6
-
21
-
-
0037660038
-
Conceptual design reconsidered - The case of the Internet session directory tool
-
Bristol, 1997. Springer: Berlin
-
Clark L, Sasse MA. Conceptual design reconsidered - the case of the Internet session directory tool. HCI '97, Bristol, 1997. Springer: Berlin, 1997; 67-84.
-
(1997)
HCI '97
, pp. 67-84
-
-
Clark, L.1
Ma, S.2
-
23
-
-
0001775576
-
Heuristic evaluation
-
Nielsen J, Mack RL (eds.). Wiley: New York
-
Nielsen J. Heuristic evaluation. Usability Inspection Methods, Nielsen J, Mack RL (eds.). Wiley: New York, 1994; 25-62.
-
(1994)
Usability Inspection Methods
, pp. 25-62
-
-
Nielsen, J.1
-
25
-
-
0033701501
-
The streamlined cognitive walkthrough method, working around social constraints encountered in a software development company
-
The Hague, The Netherlands, 2000. ACM Press: New York
-
Spencer R. The streamlined cognitive walkthrough method, working around social constraints encountered in a software development company. CHI 2000, The Hague, The Netherlands, 2000. ACM Press: New York, 2000; 353-359.
-
(2000)
CHI 2000
, pp. 353-359
-
-
Spencer, R.1
-
26
-
-
0003308923
-
Faster cheaper !! Are usability inspection methods as effective as empirical testing?
-
Nielsen J, Mack RL (eds.). Wiley: New York
-
Desurvire HW. Faster cheaper !! Are usability inspection methods as effective as empirical testing? Usability Inspection Methods, Nielsen J, Mack RL (eds.). Wiley: New York, 1994; 173-202.
-
(1994)
Usability Inspection Methods
, pp. 173-202
-
-
Desurvire, H.W.1
-
28
-
-
0035387175
-
Transforming the 'weakest link' - A human-computer interaction approach to usable and effective security
-
Sasse A, Brostoff S, Weirich D. Transforming the 'weakest link' - a human-computer interaction approach to usable and effective security. BT Technology Journal 19(3): 122-131.
-
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, A.1
Brostoff, S.2
Weirich, D.3
|