메뉴 건너뛰기




Volumn 201, Issue , 2006, Pages 296-306

A usability study of security policy management

Author keywords

[No Author keywords available]

Indexed keywords

GRAPHICAL USER INTERFACES; JAVA PROGRAMMING LANGUAGE; SECURITY OF DATA; SECURITY SYSTEMS; SEMANTICS; USER INTERFACES;

EID: 33845528583     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-33406-8_25     Document Type: Article
Times cited : (4)

References (26)
  • 1
    • 1842863099 scopus 로고    scopus 로고
    • Using security: Easier said than done
    • Furnell, SEM.: Using security: easier said than done. Computer Fraud & Security 2004(4) (2004) 6-10
    • (2004) Computer Fraud & Security , vol.2004 , Issue.4 , pp. 6-10
    • Furnell, S.M.1
  • 3
    • 33845539647 scopus 로고    scopus 로고
    • Policy tool - Policy file creation and management tool
    • Sun Microsystems Inc
    • Sun Microsystems Inc.: Policy tool - policy file creation and management tool. http://java.sun.com/j2se/l.5.0/docs/tooldocs/solaris/ policytool.html (2002)
    • (2002)
  • 5
    • 0003547217 scopus 로고    scopus 로고
    • 2nd edn. O'Reilly & Associates, Inc
    • Oaks, S.: Java Security. 2nd edn. O'Reilly & Associates, Inc. (2001)
    • (2001) Java Security
    • Oaks, S.1
  • 16
    • 19944387279 scopus 로고    scopus 로고
    • Why users cannot use security
    • Furnell, S.M.: Why users cannot use security. Computers & Security 24(4) (2005) 274-279
    • (2005) Computers & Security , vol.24 , Issue.4 , pp. 274-279
    • Furnell, S.M.1
  • 18
    • 3042539179 scopus 로고    scopus 로고
    • The use and usability of direction-based filtering in firewalls
    • Wool, A.: The use and usability of direction-based filtering in firewalls. Computers & Security 23(6) (2004) 459-468
    • (2004) Computers & Security , vol.23 , Issue.6 , pp. 459-468
    • Wool, A.1
  • 19
    • 0037252218 scopus 로고    scopus 로고
    • Good-enough security
    • Sandhu, R.S.: Good-enough security. IEEE Internet Computing 7(1) (2003) 66-68
    • (2003) IEEE Internet Computing , vol.7 , Issue.1 , pp. 66-68
    • Sandhu, R.S.1
  • 20
    • 0038226921 scopus 로고    scopus 로고
    • Moving from the design of usable security technologies to the design of useful secure applications
    • In: ACM Press
    • Smetters, D., Grinter, R.E.: Moving from the design of usable security technologies to the design of useful secure applications. In: Proceedings of the New Security Paradigms Workshop (NSPW'02), ACM Press (2002) 82-89
    • (2002) Proceedings of the New Security Paradigms Workshop (NSPW'02) , pp. 82-89
    • Smetters, D.1    Grinter, R.E.2
  • 23
    • 34547355863 scopus 로고    scopus 로고
    • Guidelines and strategies for secure interaction design
    • [26]
    • Yee, K.P.: Guidelines and strategies for secure interaction design. [26]
    • Yee, K.P.1
  • 25
    • 33845531822 scopus 로고    scopus 로고
    • Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable
    • PhD thesis, Massachusetts Institute of Technology
    • Garfinkel, S.L.: Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable. PhD thesis, Massachusetts Institute of Technology (2005)
    • (2005)
    • Garfinkel, S.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.