-
1
-
-
1842863099
-
Using security: Easier said than done
-
Furnell, SEM.: Using security: easier said than done. Computer Fraud & Security 2004(4) (2004) 6-10
-
(2004)
Computer Fraud & Security
, vol.2004
, Issue.4
, pp. 6-10
-
-
Furnell, S.M.1
-
3
-
-
33845539647
-
Policy tool - Policy file creation and management tool
-
Sun Microsystems Inc
-
Sun Microsystems Inc.: Policy tool - policy file creation and management tool. http://java.sun.com/j2se/l.5.0/docs/tooldocs/solaris/ policytool.html (2002)
-
(2002)
-
-
-
5
-
-
0003547217
-
-
2nd edn. O'Reilly & Associates, Inc
-
Oaks, S.: Java Security. 2nd edn. O'Reilly & Associates, Inc. (2001)
-
(2001)
Java Security
-
-
Oaks, S.1
-
9
-
-
0034446927
-
A secure execution framework for Java
-
In: ACM Press
-
Hauswirth, M., Kerer, C., Kurmanowytsch, R.: A secure execution framework for Java. In: Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS'00), ACM Press (2000) 43-52
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS'00)
, pp. 43-52
-
-
Hauswirth, M.1
Kerer, C.2
Kurmanowytsch, R.3
-
10
-
-
0038108908
-
Access rights analysis for Java
-
In: ACM Press
-
Koved, L., Pistoia, M., Kershenbaum, A.: Access rights analysis for Java. In: Proceedings of the 17th ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA'02), ACM Press (2002) 359-372
-
(2002)
Proceedings of the 17th ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA'02)
, pp. 359-372
-
-
Koved, L.1
Pistoia, M.2
Kershenbaum, A.3
-
12
-
-
84949500337
-
A flexible access control service for Java mobile code
-
In: IEE
-
Corradi, A, Montanari, R., Lupu, E., Sloman, M., Stefanelli, C.: A flexible access control service for Java mobile code. In: Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC'00), IEE (2000) 356-365
-
(2000)
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC'00)
, pp. 356-365
-
-
Corradi, A.1
Montanari, R.2
Lupu, E.3
Sloman, M.4
Stefanelli, C.5
-
13
-
-
0242612169
-
Empowering mobile code using expressive security policies
-
In: ACM Press
-
Venkatakrishnan, V., Peri, R., Sekar, R.: Empowering mobile code using expressive security policies. In: Proceedings of the New Security Paradigms Workshop (NSPW'02), ACM Press (2002) 61-68
-
(2002)
Proceedings of the New Security Paradigms Workshop (NSPW'02)
, pp. 61-68
-
-
Venkatakrishnan, V.1
Peri, R.2
Sekar, R.3
-
15
-
-
84869147734
-
Building security and trust in online banking
-
In: ACM Press
-
Nilsson, M., Adams, A., Herd, S.: Building security and trust in online banking. In: Proceedings of the Conference on Human Factors in Computing Systems (CHI'05), ACM Press (2005) 1701-1704
-
(2005)
Proceedings of the Conference on Human Factors in Computing Systems (CHI'05)
, pp. 1701-1704
-
-
Nilsson, M.1
Adams, A.2
Herd, S.3
-
16
-
-
19944387279
-
Why users cannot use security
-
Furnell, S.M.: Why users cannot use security. Computers & Security 24(4) (2005) 274-279
-
(2005)
Computers & Security
, vol.24
, Issue.4
, pp. 274-279
-
-
Furnell, S.M.1
-
17
-
-
0347025921
-
Security and human computer interfaces
-
Johnston, J., Eloff, J.H.P., Labuschagne, L.: Security and human computer interfaces. Computers & Security 22(8) (2003) 675-684
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 675-684
-
-
Johnston, J.1
Eloff, J.H.P.2
Labuschagne, L.3
-
18
-
-
3042539179
-
The use and usability of direction-based filtering in firewalls
-
Wool, A.: The use and usability of direction-based filtering in firewalls. Computers & Security 23(6) (2004) 459-468
-
(2004)
Computers & Security
, vol.23
, Issue.6
, pp. 459-468
-
-
Wool, A.1
-
19
-
-
0037252218
-
Good-enough security
-
Sandhu, R.S.: Good-enough security. IEEE Internet Computing 7(1) (2003) 66-68
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.1
, pp. 66-68
-
-
Sandhu, R.S.1
-
20
-
-
0038226921
-
Moving from the design of usable security technologies to the design of useful secure applications
-
In: ACM Press
-
Smetters, D., Grinter, R.E.: Moving from the design of usable security technologies to the design of useful secure applications. In: Proceedings of the New Security Paradigms Workshop (NSPW'02), ACM Press (2002) 82-89
-
(2002)
Proceedings of the New Security Paradigms Workshop (NSPW'02)
, pp. 82-89
-
-
Smetters, D.1
Grinter, R.E.2
-
23
-
-
34547355863
-
Guidelines and strategies for secure interaction design
-
[26]
-
Yee, K.P.: Guidelines and strategies for secure interaction design. [26]
-
-
-
Yee, K.P.1
-
25
-
-
33845531822
-
Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable
-
PhD thesis, Massachusetts Institute of Technology
-
Garfinkel, S.L.: Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable. PhD thesis, Massachusetts Institute of Technology (2005)
-
(2005)
-
-
Garfinkel, S.L.1
|