메뉴 건너뛰기




Volumn , Issue , 2005, Pages 60-69

User interface dependability through goal-error prevention

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SECURITY APPLICATIONS; GOAL-ERROR PREVENTION; HUMAN-MADE CONFIGURATION ERRORS; USER INTERFACE DEPENDABILITY;

EID: 27544434179     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2005.95     Document Type: Conference Paper
Times cited : (17)

References (25)
  • 2
    • 84944717964 scopus 로고    scopus 로고
    • Usable access control for the World Wide Web
    • Los Alamitos, CA, 2003. IEEE Comp. Society. 08-12 Dec, Las Vegas, NV
    • D. Balfanz. Usable access control for the World Wide Web. In Proceedings of 19th Annual Computer Security Applications Conference, pages 406-415, Los Alamitos, CA, 2003. IEEE Comp. Society. 08-12 Dec 2003, Las Vegas, NV.
    • (2003) Proceedings of 19th Annual Computer Security Applications Conference , pp. 406-415
    • Balfanz, D.1
  • 3
    • 2342598277 scopus 로고    scopus 로고
    • Computer security impaired by legitimate users
    • D. Besnard and B. Arief. Computer security impaired by legitimate users. Computers & Security, 23(3):253-264, 2004.
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 253-264
    • Besnard, D.1    Arief, B.2
  • 9
    • 19944382652 scopus 로고    scopus 로고
    • A prototype user interface for coarse-grained desktop access control
    • Comp. Sci. Dept, Carnegie Mellon University, Pittsburgh, PA, Nov.
    • A. C. Long, C. Moskowitz, and G. Ganger. A prototype user interface for coarse-grained desktop access control. Technical Report CMU-CS-03-200, Comp. Sci. Dept, Carnegie Mellon University, Pittsburgh, PA, Nov. 2003.
    • (2003) Technical Report , vol.CMU-CS-03-200
    • Long, A.C.1    Moskowitz, C.2    Ganger, G.3
  • 10
    • 19944388751 scopus 로고    scopus 로고
    • Microsoft Corporation. Best practices for permissions and user rights. Available at http://www.microsoft.com/resources/documentation/ windowsserv/2003/stand%ard/proddocs/en-us/sag_SEconceptsImpACBP.asp, 2005.
    • (2005) Best Practices for Permissions and User Rights
  • 15
    • 0004223940 scopus 로고
    • Cambridge University Press, Cambridge, UK
    • J. Reason. Human Error. Cambridge University Press, Cambridge, UK, 1990.
    • (1990) Human Error
    • Reason, J.1
  • 18
    • 27544496774 scopus 로고    scopus 로고
    • Personal communication, March
    • R. Smith. Personal communication, March 2004.
    • (2004)
    • Smith, R.1
  • 20
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • Berkeley, California, 1999. USENIX Association. 23-26 August, Washington, DC
    • A. Whitten and J. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, pages 169-184, Berkeley, California, 1999. USENIX Association. 23-26 August 1999, Washington, DC.
    • (1999) Proceedings of the 8th USENIX Security Symposium , pp. 169-184
    • Whitten, A.1    Tygar, J.2
  • 22
    • 0002446449 scopus 로고
    • Cognitive systems engineering
    • M. Helander, editor, chapter 1. Elsevier Science Publishers B.V., Amsterdam, The Netherlands, 1st edition
    • D. D. Woods and E. M. Roth. Cognitive systems engineering. In M. Helander, editor, Handbook of Human-Computer Interaction, chapter 1, pages 3-43. Elsevier Science Publishers B.V., Amsterdam, The Netherlands, 1st edition, 1988.
    • (1988) Handbook of Human-computer Interaction , pp. 3-43
    • Woods, D.D.1    Roth, E.M.2
  • 23
    • 84944056366 scopus 로고    scopus 로고
    • User interaction design for secure systems
    • Lecture Notes in Computer Science, New York, NY, 2002. Springer. 09-12 December, Singapore
    • K. Yee. User interaction design for secure systems. In Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, Lecture Notes in Computer Science, Vol. 2513, pages 278-290, New York, NY, 2002. Springer. 09-12 December 2002, Singapore.
    • (2002) Information and Communications Security, 4th International Conference, ICICS 2002, Singapore , vol.2513 , pp. 278-290
    • Yee, K.1
  • 24
    • 0032629460 scopus 로고    scopus 로고
    • A user-centered, modular authorization service built on an RBAC foundation
    • Los Alamitos, CA, 1999. IEEE Computer Security Press. 09-12 May, Berkeley, California
    • M. E. Zurko, R. Simon, and T. Sanfilippo. A user-centered, modular authorization service built on an RBAC foundation. In Proceedings 1999 IEEE Symposium on Security and Privacy, pages 57-71, Los Alamitos, CA, 1999. IEEE Computer Security Press. 09-12 May 1999, Berkeley, California.
    • (1999) Proceedings 1999 IEEE Symposium on Security and Privacy , pp. 57-71
    • Zurko, M.E.1    Simon, R.2    Sanfilippo, T.3
  • 25
    • 84926001904 scopus 로고    scopus 로고
    • User-centered security
    • New York, NY, 1996. ACM Press. 17-20 September, Lake Arrowhead, CA
    • M. E. Zurko and R. T. Simon. User-centered security. In Proceedings of Workshop on New Security Paradigms, pages 27-33, New York, NY, 1996. ACM Press. 17-20 September 1996, Lake Arrowhead, CA.
    • (1996) Proceedings of Workshop on New Security Paradigms , pp. 27-33
    • Zurko, M.E.1    Simon, R.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.