-
2
-
-
84944717964
-
Usable access control for the World Wide Web
-
Los Alamitos, CA, 2003. IEEE Comp. Society. 08-12 Dec, Las Vegas, NV
-
D. Balfanz. Usable access control for the World Wide Web. In Proceedings of 19th Annual Computer Security Applications Conference, pages 406-415, Los Alamitos, CA, 2003. IEEE Comp. Society. 08-12 Dec 2003, Las Vegas, NV.
-
(2003)
Proceedings of 19th Annual Computer Security Applications Conference
, pp. 406-415
-
-
Balfanz, D.1
-
3
-
-
2342598277
-
Computer security impaired by legitimate users
-
D. Besnard and B. Arief. Computer security impaired by legitimate users. Computers & Security, 23(3):253-264, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 253-264
-
-
Besnard, D.1
Arief, B.2
-
4
-
-
19944404575
-
Information visualization
-
J. A. Jacko and A. Sears, editors, chapter 28. Lawrence Erlbaum Associates, Mahwah, NJ
-
S. Card. Information visualization. In J. A. Jacko and A. Sears, editors, The Human-Computer Interaction Handbook Fundamentals, Evolving Technologies and Emerging Applications, chapter 28, pages 544-582. Lawrence Erlbaum Associates, Mahwah, NJ, 2003.
-
(2003)
The Human-computer Interaction Handbook Fundamentals, Evolving Technologies and Emerging Applications
, pp. 544-582
-
-
Card, S.1
-
7
-
-
0038713945
-
Usability and privacy: A study of Kazaa P2P file-sharing
-
New York, NY, 2003. ACM Press. 05-10 April, Fort Lauderdale, Florida
-
N. S. Good and A. Krekelberg. Usability and privacy: a study of Kazaa P2P file-sharing. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2003), pages 137-144, New York, NY, 2003. ACM Press. 05-10 April 2003, Fort Lauderdale, Florida.
-
(2003)
Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2003)
, pp. 137-144
-
-
Good, N.S.1
Krekelberg, A.2
-
9
-
-
19944382652
-
A prototype user interface for coarse-grained desktop access control
-
Comp. Sci. Dept, Carnegie Mellon University, Pittsburgh, PA, Nov.
-
A. C. Long, C. Moskowitz, and G. Ganger. A prototype user interface for coarse-grained desktop access control. Technical Report CMU-CS-03-200, Comp. Sci. Dept, Carnegie Mellon University, Pittsburgh, PA, Nov. 2003.
-
(2003)
Technical Report
, vol.CMU-CS-03-200
-
-
Long, A.C.1
Moskowitz, C.2
Ganger, G.3
-
10
-
-
19944388751
-
-
Microsoft Corporation. Best practices for permissions and user rights. Available at http://www.microsoft.com/resources/documentation/ windowsserv/2003/stand%ard/proddocs/en-us/sag_SEconceptsImpACBP.asp, 2005.
-
(2005)
Best Practices for Permissions and User Rights
-
-
-
14
-
-
0005365039
-
Thea: A technique for human error assessment early in design
-
Amsterdam, 2001. IOS Press. 09-13 July, Tokyo, Japan
-
S. Pocock, M. Harrison, P. Wright, and P. Johnson. Thea: A technique for human error assessment early in design. In Proceeding of 8th IFIP TC.13 Conference on Human-Computer Interaction, pages 247-254, Amsterdam, 2001. IOS Press. 09-13 July 2001, Tokyo, Japan.
-
(2001)
Proceeding of 8th IFIP TC.13 Conference on Human-computer Interaction
, pp. 247-254
-
-
Pocock, S.1
Harrison, M.2
Wright, P.3
Johnson, P.4
-
15
-
-
0004223940
-
-
Cambridge University Press, Cambridge, UK
-
J. Reason. Human Error. Cambridge University Press, Cambridge, UK, 1990.
-
(1990)
Human Error
-
-
Reason, J.1
-
16
-
-
84948983013
-
Access control for active spaces
-
Los Alamitos, CA, 2002. IEEE Computer Society. 09-13 December, Las Vegas, NV
-
G. Sampemane, P. Naldurg, and R. H. Campbell. Access control for active spaces. In Proceedings of the 18th Annual Computer Security Applications Conference, pages 343-352, Los Alamitos, CA, 2002. IEEE Computer Society. 09-13 December 2002, Las Vegas, NV.
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference
, pp. 343-352
-
-
Sampemane, G.1
Naldurg, P.2
Campbell, R.H.3
-
17
-
-
0003536295
-
-
Lawrence Erlbaum Associates, Hillsdale, New Jersey
-
J. W. Senders and N. P. Moray. Human Error: Cause, Prediction, and Reduction. Lawrence Erlbaum Associates, Hillsdale, New Jersey, 1991.
-
(1991)
Human Error: Cause, Prediction, and Reduction
-
-
Senders, J.W.1
Moray, N.P.2
-
18
-
-
27544496774
-
-
Personal communication, March
-
R. Smith. Personal communication, March 2004.
-
(2004)
-
-
Smith, R.1
-
20
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
Berkeley, California, 1999. USENIX Association. 23-26 August, Washington, DC
-
A. Whitten and J. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, pages 169-184, Berkeley, California, 1999. USENIX Association. 23-26 August 1999, Washington, DC.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.2
-
22
-
-
0002446449
-
Cognitive systems engineering
-
M. Helander, editor, chapter 1. Elsevier Science Publishers B.V., Amsterdam, The Netherlands, 1st edition
-
D. D. Woods and E. M. Roth. Cognitive systems engineering. In M. Helander, editor, Handbook of Human-Computer Interaction, chapter 1, pages 3-43. Elsevier Science Publishers B.V., Amsterdam, The Netherlands, 1st edition, 1988.
-
(1988)
Handbook of Human-computer Interaction
, pp. 3-43
-
-
Woods, D.D.1
Roth, E.M.2
-
23
-
-
84944056366
-
User interaction design for secure systems
-
Lecture Notes in Computer Science, New York, NY, 2002. Springer. 09-12 December, Singapore
-
K. Yee. User interaction design for secure systems. In Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, Lecture Notes in Computer Science, Vol. 2513, pages 278-290, New York, NY, 2002. Springer. 09-12 December 2002, Singapore.
-
(2002)
Information and Communications Security, 4th International Conference, ICICS 2002, Singapore
, vol.2513
, pp. 278-290
-
-
Yee, K.1
-
24
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
Los Alamitos, CA, 1999. IEEE Computer Security Press. 09-12 May, Berkeley, California
-
M. E. Zurko, R. Simon, and T. Sanfilippo. A user-centered, modular authorization service built on an RBAC foundation. In Proceedings 1999 IEEE Symposium on Security and Privacy, pages 57-71, Los Alamitos, CA, 1999. IEEE Computer Security Press. 09-12 May 1999, Berkeley, California.
-
(1999)
Proceedings 1999 IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.E.1
Simon, R.2
Sanfilippo, T.3
-
25
-
-
84926001904
-
User-centered security
-
New York, NY, 1996. ACM Press. 17-20 September, Lake Arrowhead, CA
-
M. E. Zurko and R. T. Simon. User-centered security. In Proceedings of Workshop on New Security Paradigms, pages 27-33, New York, NY, 1996. ACM Press. 17-20 September 1996, Lake Arrowhead, CA.
-
(1996)
Proceedings of Workshop on New Security Paradigms
, pp. 27-33
-
-
Zurko, M.E.1
Simon, R.T.2
|