메뉴 건너뛰기




Volumn 35, Issue 9, 2005, Pages 835-856

'R-What?' Development of a role-based access control policy-writing tool for e-Scientists

Author keywords

Policy generation; RBAC user interface; Usability

Indexed keywords

DATA PROCESSING; DATA REDUCTION; DECISION MAKING; PUBLIC POLICY; RESOURCE ALLOCATION; SOFTWARE ENGINEERING; SOFTWARE PROTOTYPING; USER INTERFACES;

EID: 22144439749     PISSN: 00380644     EISSN: None     Source Type: Journal    
DOI: 10.1002/spe.691     Document Type: Conference Paper
Times cited : (25)

References (28)
  • 1
    • 0037362986 scopus 로고    scopus 로고
    • Implementing role based access controls using X.509 attribute certificates
    • Chadwick DW, Otenko A, Ball E. Implementing role based access controls using X.509 attribute certificates. IEEE Internet Computing, 2003; (March-April):62-69.
    • (2003) IEEE Internet Computing , Issue.MARCH-APRIL , pp. 62-69
    • Chadwick, D.W.1    Otenko, A.2    Ball, E.3
  • 2
    • 0032629460 scopus 로고    scopus 로고
    • A user-centered, modular authorization service built on an RBAC foundation
    • IEEE Computer Press: Los Alamitos, CA
    • Zurko ME, Simon R, Sanfilippo T. A user-centered, modular authorization service built on an RBAC foundation. IEEE Symposium on Security and Privacy. IEEE Computer Press: Los Alamitos, CA, 1999; 57-71.
    • (1999) IEEE Symposium on Security and Privacy , pp. 57-71
    • Zurko, M.E.1    Simon, R.2    Sanfilippo, T.3
  • 3
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer JH, Schroeder MD. The protection of information in computer systems. Proceedings of IEEE 1975; 63(9):1278-1308.
    • (1975) Proceedings of IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 9
    • 12844271558 scopus 로고    scopus 로고
    • Aligning security and usability
    • Yee K-P. Aligning security and usability. IEEE Security and Privacy 2004; (Sept/Oct):48-55.
    • (2004) IEEE Security and Privacy , Issue.SEPT-OCT , pp. 48-55
    • Yee, K.-P.1
  • 12
    • 0027850828 scopus 로고
    • A mathematical model of the finding of usability problems
    • ACM Press: New York
    • Nielsen J, Landauer TK. A mathematical model of the finding of usability problems. INTERCHI '93. ACM Press: New York, 1993; 206-213.
    • (1993) INTERCHI '93 , pp. 206-213
    • Nielsen, J.1    Landauer, T.K.2
  • 14
    • 0038343292 scopus 로고    scopus 로고
    • Why and when five test users aren't enough
    • Toulouse, 2001. Cépadèus Éditions
    • Woolrych A, Cockton G. Why and when five test users aren't enough. IHM-HCI2001. Toulouse, 2001. Cépadèus Éditions, 2001; 105-108.
    • (2001) IHM-HCI2001 , pp. 105-108
    • Woolrych, A.1    Cockton, G.2
  • 17
    • 4544326494 scopus 로고    scopus 로고
    • Analysis of combinatorial user effect in international usability tests
    • Vienna, Austria. ACM Press: New York
    • Law EL-C, Hvannberg ET. Analysis of combinatorial user effect in international usability tests. CHI2004. Vienna, Austria. ACM Press: New York, 2004; 9-16.
    • (2004) CHI2004 , pp. 9-16
    • Law, E.L.-C.1    Hvannberg, E.T.2
  • 18
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • Washington
    • Whitten A, Tygar JD. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. 9th USENIX Security Symposium, Washington, 1999.
    • (1999) 9th USENIX Security Symposium
    • Whitten, A.1    Tygar, J.D.2
  • 19
    • 0002485160 scopus 로고
    • Some observations on mental models
    • Gentner DA, Stevens AA (eds.). Lawrence Erlbaum Associates: Hillsdale, NJ
    • Norman D. Some observations on mental models. Mental Models, Gentner DA, Stevens AA (eds.). Lawrence Erlbaum Associates: Hillsdale, NJ, 1986.
    • (1986) Mental Models
    • Norman, D.1
  • 20
    • 0011101935 scopus 로고
    • Minimising conceptual baggage: Making choices about metaphor
    • Glasgow, 1994. Cambridge University Press: Cambridge
    • Anderson B, Smyth M, Knott RP, Bergan M, Bergan J, Alty JL. Minimising conceptual baggage: Making choices about metaphor. People and Computers IX, Glasgow, 1994. Cambridge University Press: Cambridge, 1994; 179-194.
    • (1994) People and Computers IX , pp. 179-194
    • Anderson, B.1    Smyth, M.2    Knott, R.P.3    Bergan, M.4    Bergan, J.5    Alty, J.L.6
  • 21
    • 0037660038 scopus 로고    scopus 로고
    • Conceptual design reconsidered - The case of the Internet session directory tool
    • Bristol, 1997. Springer: Berlin
    • Clark L, Sasse MA. Conceptual design reconsidered - the case of the Internet session directory tool. HCI '97, Bristol, 1997. Springer: Berlin, 1997; 67-84.
    • (1997) HCI '97 , pp. 67-84
    • Clark, L.1    Ma, S.2
  • 23
    • 0001775576 scopus 로고
    • Heuristic evaluation
    • Nielsen J, Mack RL (eds.). Wiley: New York
    • Nielsen J. Heuristic evaluation. Usability Inspection Methods, Nielsen J, Mack RL (eds.). Wiley: New York, 1994; 25-62.
    • (1994) Usability Inspection Methods , pp. 25-62
    • Nielsen, J.1
  • 25
    • 0033701501 scopus 로고    scopus 로고
    • The streamlined cognitive walkthrough method, working around social constraints encountered in a software development company
    • The Hague, The Netherlands, 2000. ACM Press: New York
    • Spencer R. The streamlined cognitive walkthrough method, working around social constraints encountered in a software development company. CHI 2000, The Hague, The Netherlands, 2000. ACM Press: New York, 2000; 353-359.
    • (2000) CHI 2000 , pp. 353-359
    • Spencer, R.1
  • 26
    • 0003308923 scopus 로고
    • Faster cheaper !! Are usability inspection methods as effective as empirical testing?
    • Nielsen J, Mack RL (eds.). Wiley: New York
    • Desurvire HW. Faster cheaper !! Are usability inspection methods as effective as empirical testing? Usability Inspection Methods, Nielsen J, Mack RL (eds.). Wiley: New York, 1994; 173-202.
    • (1994) Usability Inspection Methods , pp. 173-202
    • Desurvire, H.W.1
  • 28
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - A human-computer interaction approach to usable and effective security
    • Sasse A, Brostoff S, Weirich D. Transforming the 'weakest link' - a human-computer interaction approach to usable and effective security. BT Technology Journal 19(3): 122-131.
    • BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, A.1    Brostoff, S.2    Weirich, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.