메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 189-202

User-centered security: Stepping up to the grand challenge

Author keywords

[No Author keywords available]

Indexed keywords

EXPERT SYSTEMS; HUMAN COMPUTER INTERACTION; LIFE CYCLE; PRODUCT DEVELOPMENT; SOFTWARE ENGINEERING;

EID: 33846277633     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.60     Document Type: Conference Paper
Times cited : (60)

References (63)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users Are Not The Enemy
    • December
    • Anne Adams and Martina Angela Sasse, "Users Are Not The Enemy", Communications of the AM, vol. 42, issue 12, December 1999, pp 40-46.
    • (1999) Communications of the AM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Angela Sasse, M.2
  • 3
    • 84867732734 scopus 로고    scopus 로고
    • Making the Impossible Easy: Usable PKI
    • People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
    • Dirk Balfanz, Glenn Durfee, and D. K. Smetters, "Making the Impossible Easy: Usable PKI", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
    • (2005) Security and Usability: Designing Secure Systems that
    • Balfanz, D.1    Durfee, G.2    Smetters, D.K.3
  • 5
    • 34948838524 scopus 로고    scopus 로고
    • ZoneAlarm: Creating Usable Security Products for Consumers
    • People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
    • Jordy Berson, "ZoneAlarm: Creating Usable Security Products for Consumers", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
    • (2005) Security and Usability: Designing Secure Systems that
    • Berson, J.1
  • 7
    • 33846266800 scopus 로고    scopus 로고
    • A User-Centric Privacy Space Framework
    • People Can Use, Lome Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
    • Benjamin Brunk, "A User-Centric Privacy Space Framework", Security and Usability: Designing Secure Systems that People Can Use, Lome Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
    • (2005) Security and Usability: Designing Secure Systems that
    • Brunk, B.1
  • 9
    • 33846299451 scopus 로고    scopus 로고
    • Common Criteria for Information Technology Security Evaluation, version 2.2, January 2004
    • Common Criteria for Information Technology Security Evaluation, version 2.2, January 2004, http://www.commoncriteriaportal.org/public/expert/index.php? menu=2
  • 10
    • 33846312676 scopus 로고    scopus 로고
    • CRA Confernence on Grand Research Challenges in Information Security & Assurance
    • CRA Confernence on Grand Research Challenges in Information Security & Assurance, http://www.cra.org/Activities/grand.challenges/security/home. html
  • 14
    • 0242696305 scopus 로고    scopus 로고
    • An Approach to Usable Security Based on Event Monitoring and Visualization
    • Virginia Beach, Virginia, pp
    • Paul Dourish and David Redmiles, "An Approach to Usable Security Based on Event Monitoring and Visualization", Proceedings of the 2002 workshop on New Security Paradigms, Virginia Beach, Virginia, pp. 75-81.
    • Proceedings of the 2002 workshop on New Security Paradigms , pp. 75-81
    • Dourish, P.1    Redmiles, D.2
  • 16
    • 77953753799 scopus 로고    scopus 로고
    • Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express
    • Pittsburgh, Pennsylvania, pp
    • Simson L. Garfinkel and Robert C. Miller, "Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express", Proceedings of the 2005 Symposium On Usable Privacy and Security, Pittsburgh, Pennsylvania, pp. 13-24.
    • Proceedings of the 2005 Symposium On Usable Privacy and Security , pp. 13-24
    • Garfinkel, S.L.1    Miller, R.C.2
  • 21
    • 33846315297 scopus 로고    scopus 로고
    • 21, personal communication
    • [21 ] Steven J. Greenwald, personal communication.
    • Greenwald, S.J.1
  • 24
    • 0012076259 scopus 로고
    • Iterative Usability Testing of a Security Application Computer Systems: Approaches to User Interface Design
    • Clare-Marie Karat, Iterative Usability Testing of a Security Application Computer Systems: Approaches to User Interface Design, Proceedings of the Human Factors Society 33rd Annual Meeting, 1989, v. 1, pp. 273-277.
    • (1989) Proceedings of the Human Factors Society 33rd Annual Meeting , vol.1 , pp. 273-277
    • Karat, C.1
  • 26
    • 33846301881 scopus 로고    scopus 로고
    • Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
    • Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
  • 27
    • 33846317989 scopus 로고    scopus 로고
    • hcisec - Computer Security and Usability, http://groups.yahoo.com/group/ hcisec/.
    • hcisec - Computer Security and Usability, http://groups.yahoo.com/group/ hcisec/.
  • 29
    • 33846267542 scopus 로고    scopus 로고
    • Information technology, Security techniques, Code of practice for information security management
    • Information technology - Security techniques - Code of practice for information security management, http://www.iso.org/iso/en/CatalogueDetailPage. CatalogueDetail?CSNUMBER=39612&ICSl=35&ICS2=40&ICS3=
  • 30
    • 0027634119 scopus 로고
    • An Investigation of the Therac-25 Accidents
    • July
    • Nancy Leveson and Clark S. Turner, "An Investigation of the Therac-25 Accidents", IEEE Computer, Vol. 26, No. 7, July 1993, pp. 18-41.
    • (1993) IEEE Computer , vol.26 , Issue.7 , pp. 18-41
    • Leveson, N.1    Turner, C.S.2
  • 33
    • 0012127229 scopus 로고    scopus 로고
    • Intrusion and Intrusion Detection
    • John McHugh, "Intrusion and Intrusion Detection", IJIS, 2001, v. 1, pp 14-35.
    • (2001) IJIS , vol.1 , pp. 14-35
    • McHugh, J.1
  • 34
    • 33846313058 scopus 로고    scopus 로고
    • When User Studies Attack: Evaluating Security By Intentionally Attacking Users
    • Pittsburgh, Pennsylvania
    • Robert Miller, Simson Garfinkel, Filippo Menczer, Robert Kraut, "When User Studies Attack: Evaluating Security By Intentionally Attacking Users", 2005 Symposium On Usable Privacy and Security, Pittsburgh, Pennsylvania.
    • (2005) Symposium On Usable Privacy and Security
    • Miller, R.1    Garfinkel, S.2    Menczer, F.3    Kraut, R.4
  • 38
    • 36549056853 scopus 로고    scopus 로고
    • Designing Systems That People Will Trust
    • People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
    • Andrew S. Patrick, Pamela Briggs, and Stephen Marsh, "Designing Systems That People Will Trust", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
    • (2005) Security and Usability: Designing Secure Systems that
    • Patrick, A.S.1    Briggs, P.2    Marsh, S.3
  • 40
    • 0004223940 scopus 로고
    • Cambridge, UK; Cambridge University Press
    • J. Reason, Human Error, Cambridge, UK; Cambridge University Press, 1990.
    • (1990) Human Error
    • Reason, J.1
  • 41
    • 35348885452 scopus 로고    scopus 로고
    • Evaluating Authentication Mechanisms
    • People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
    • Karen Renaud, "Evaluating Authentication Mechanisms", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
    • (2005) Security and Usability: Designing Secure Systems that
    • Renaud, K.1
  • 42
    • 80052807260 scopus 로고    scopus 로고
    • Firefox and the Worry-free Web
    • People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
    • Blake Ross, "Firefox and the Worry-free Web", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
    • (2005) Security and Usability: Designing Secure Systems that
    • Ross, B.1
  • 43
    • 33846275685 scopus 로고    scopus 로고
    • Anne Saita, Password protection no match for Easter egg lovers, http://searchsecurity.techtarget.com/originalContent/0,289142, sid14_gci960468,00.html
    • Anne Saita, "Password protection no match for Easter egg lovers", http://searchsecurity.techtarget.com/originalContent/0,289142, sid14_gci960468,00.html
  • 47
    • 33846294975 scopus 로고    scopus 로고
    • October 15
    • Bruce Schneier, Crypto-Gram Newsletter, October 15, 2000, http://www.schneier.com/crypto-gram-0010.html.
    • (2000)
    • Schneier, B.1    Newsletter, C.2
  • 50
    • 35348892019 scopus 로고    scopus 로고
    • Design for Usability
    • People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
    • Bruce Tognazzini, "Design for Usability", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
    • (2005) Security and Usability: Designing Secure Systems that
    • Tognazzini, B.1
  • 57
    • 33846323486 scopus 로고    scopus 로고
    • The Memorability and Security of Passwords
    • People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
    • Jeff Yan, Alan Blackwell, Ross Anderson, and Alasdair Grant, "The Memorability and Security of Passwords", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
    • (2005) Security and Usability: Designing Secure Systems that
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4
  • 58
    • 12844271558 scopus 로고    scopus 로고
    • Aligning Security and Usability
    • September, October
    • Ka-Ping Yee, "Aligning Security and Usability", IEEE Security and Privacy, vol. 02, no. 5, pp. 48-55, September - October 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 48-55
    • Yee, K.1
  • 62
    • 84948973276 scopus 로고    scopus 로고
    • th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 2002.
    • th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 2002.
  • 63
    • 33846321698 scopus 로고    scopus 로고
    • IBM Lotus Notes/Domino: Embedding Seurity in Collaborative Applications
    • People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
    • Mary Ellen Zurko, "IBM Lotus Notes/Domino: Embedding Seurity in Collaborative Applications", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
    • (2005) Security and Usability: Designing Secure Systems that
    • Ellen Zurko, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.