-
1
-
-
0043232732
-
Users Are Not The Enemy
-
December
-
Anne Adams and Martina Angela Sasse, "Users Are Not The Enemy", Communications of the AM, vol. 42, issue 12, December 1999, pp 40-46.
-
(1999)
Communications of the AM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Angela Sasse, M.2
-
2
-
-
0004200684
-
-
Bedford, MA, USAF Electronics Systems Division, October
-
J. P. Anderson, Computer Security Technology Planning Study, ESD-TR-73-51, Bedford, MA, USAF Electronics Systems Division, October 1972.
-
(1972)
Computer Security Technology Planning Study, ESD-TR-73-51
-
-
Anderson, J.P.1
-
3
-
-
84867732734
-
Making the Impossible Easy: Usable PKI
-
People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
-
Dirk Balfanz, Glenn Durfee, and D. K. Smetters, "Making the Impossible Easy: Usable PKI", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
(2005)
Security and Usability: Designing Secure Systems that
-
-
Balfanz, D.1
Durfee, G.2
Smetters, D.K.3
-
5
-
-
34948838524
-
ZoneAlarm: Creating Usable Security Products for Consumers
-
People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
-
Jordy Berson, "ZoneAlarm: Creating Usable Security Products for Consumers", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
(2005)
Security and Usability: Designing Secure Systems that
-
-
Berson, J.1
-
6
-
-
0242665376
-
Information Security is Information Risk Management
-
New Mexico
-
Bob Blakley, Ellen McDermott, and Dan Geer, "Information Security is Information Risk Management", New Security Paradigms Workshop, ACM Press, Cloudcroft, New Mexico, 2001, pp. 97-104.
-
(2001)
New Security Paradigms Workshop, ACM Press, Cloudcroft
, pp. 97-104
-
-
Blakley, B.1
McDermott, E.2
Geer, D.3
-
7
-
-
33846266800
-
A User-Centric Privacy Space Framework
-
People Can Use, Lome Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
-
Benjamin Brunk, "A User-Centric Privacy Space Framework", Security and Usability: Designing Secure Systems that People Can Use, Lome Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
(2005)
Security and Usability: Designing Secure Systems that
-
-
Brunk, B.1
-
9
-
-
33846299451
-
-
Common Criteria for Information Technology Security Evaluation, version 2.2, January 2004
-
Common Criteria for Information Technology Security Evaluation, version 2.2, January 2004, http://www.commoncriteriaportal.org/public/expert/index.php? menu=2
-
-
-
-
10
-
-
33846312676
-
-
CRA Confernence on Grand Research Challenges in Information Security & Assurance
-
CRA Confernence on Grand Research Challenges in Information Security & Assurance, http://www.cra.org/Activities/grand.challenges/security/home. html
-
-
-
-
11
-
-
33846318758
-
-
People Can Use, Lome Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
-
Lorrie Faith Cranor, Privacy Policies and Privacy Preferences, Security and Usability: Designing Secure Systems that People Can Use, Lome Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
(2005)
Privacy Policies and Privacy Preferences, Security and Usability: Designing Secure Systems that
-
-
Faith Cranor, L.1
-
12
-
-
77953740422
-
Two Experiences Designing for Effective Security
-
Pittsburgh, Pennsylvania, pp
-
Rogerio de Paula, Xianghua Ding, Paul Dourish, Kari Nies, Ben Pillet, David Redmiles, Jie Ren, Jennifer Rode, Roberta Silva Filho, Two Experiences Designing for Effective Security, Proceedings of the 2005 Symposium On Usable Privacy and Security, Pittsburgh, Pennsylvania, pp. 25-34.
-
Proceedings of the 2005 Symposium On Usable Privacy and Security
, pp. 25-34
-
-
Rogerio de Paula, X.D.1
Dourish, P.2
Nies, K.3
Pillet, B.4
Redmiles, D.5
Ren, J.6
Rode, J.7
Silva Filho, R.8
-
13
-
-
33745807143
-
Social Navigation as a Model for Usable Security
-
Pittsburgh, Pennsylvania, pp
-
Paul DiGioia, Paul Dourish, "Social Navigation as a Model for Usable Security", Proceedings of the 2005 Symposium On Usable Privacy and Security, Pittsburgh, Pennsylvania, pp. 101-108.
-
Proceedings of the 2005 Symposium On Usable Privacy and Security
, pp. 101-108
-
-
DiGioia, P.1
Dourish, P.2
-
14
-
-
0242696305
-
An Approach to Usable Security Based on Event Monitoring and Visualization
-
Virginia Beach, Virginia, pp
-
Paul Dourish and David Redmiles, "An Approach to Usable Security Based on Event Monitoring and Visualization", Proceedings of the 2002 workshop on New Security Paradigms, Virginia Beach, Virginia, pp. 75-81.
-
Proceedings of the 2002 workshop on New Security Paradigms
, pp. 75-81
-
-
Dourish, P.1
Redmiles, D.2
-
16
-
-
77953753799
-
Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express
-
Pittsburgh, Pennsylvania, pp
-
Simson L. Garfinkel and Robert C. Miller, "Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express", Proceedings of the 2005 Symposium On Usable Privacy and Security, Pittsburgh, Pennsylvania, pp. 13-24.
-
Proceedings of the 2005 Symposium On Usable Privacy and Security
, pp. 13-24
-
-
Garfinkel, S.L.1
Miller, R.C.2
-
17
-
-
0003563348
-
-
Van Nostrand Reinhold, New York, NY, USA
-
Morrie Gasser, Building a Secure Computer System, Van Nostrand Reinhold, New York, NY, USA, 1988.
-
(1988)
Building a Secure Computer System
-
-
Gasser, M.1
-
19
-
-
33846325326
-
-
People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
-
Jeremy Goecks and Elizabeth D. Mynatt, Social Approaches to End-User Privacy Management, Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
(2005)
Social Approaches to End-User Privacy Management, Security and Usability: Designing Secure Systems that
-
-
Goecks, J.1
Mynatt, E.D.2
-
20
-
-
77953767524
-
Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware
-
Pittsburgh, Pennsylvania, pp
-
Nathaniel Good, Rachna Dhamija, Jens Grossklags, David Thaw, Steven Aronowitz, Deirdre Mulligan, and Joseph Konstan, "Stopping Spyware at the Gate: a User Study of Privacy, Notice and Spyware", Proceedings of the 2005 Symposium On Usable Privacy and Security, Pittsburgh, Pennsylvania, pp 43-52.
-
Proceedings of the 2005 Symposium On Usable Privacy and Security
, pp. 43-52
-
-
Good, N.1
Dhamija, R.2
Grossklags, J.3
Thaw, D.4
Aronowitz, S.5
Mulligan, D.6
Konstan, J.7
-
21
-
-
33846315297
-
-
21, personal communication
-
[21 ] Steven J. Greenwald, personal communication.
-
-
-
Greenwald, S.J.1
-
23
-
-
20444409093
-
The Eclipse 3.0 platform: Adopting OSGi technology
-
O. Gruber, B. J. Hargrave, J. McAffer, P. Rapicault, and T. Watson, "The Eclipse 3.0 platform: Adopting OSGi technology", IBM Systems Journal, v. 44, # 2, page 289, 2005.
-
(2005)
IBM Systems Journal
, vol.44
, Issue.2
, pp. 289
-
-
Gruber, O.1
Hargrave, B.J.2
McAffer, J.3
Rapicault, P.4
Watson, T.5
-
24
-
-
0012076259
-
Iterative Usability Testing of a Security Application Computer Systems: Approaches to User Interface Design
-
Clare-Marie Karat, Iterative Usability Testing of a Security Application Computer Systems: Approaches to User Interface Design, Proceedings of the Human Factors Society 33rd Annual Meeting, 1989, v. 1, pp. 273-277.
-
(1989)
Proceedings of the Human Factors Society 33rd Annual Meeting
, vol.1
, pp. 273-277
-
-
Karat, C.1
-
26
-
-
33846301881
-
-
Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
-
-
-
27
-
-
33846317989
-
-
hcisec - Computer Security and Usability, http://groups.yahoo.com/group/ hcisec/.
-
hcisec - Computer Security and Usability, http://groups.yahoo.com/group/ hcisec/.
-
-
-
-
28
-
-
77953759665
-
Developing Privacy Guidelines for Social Location Disclosure Applications and Services
-
Pittsburgh, Pennsylvania, pp
-
Giovanni Iachello, Ian Smith, Sunny Consolvo, Mike Chen, and Gregory D. Abowd, "Developing Privacy Guidelines for Social Location Disclosure Applications and Services", Proceedings of the 2005 Symposium On Usable Privacy and Security, Pittsburgh, Pennsylvania, pp. 65-76.
-
Proceedings of the 2005 Symposium On Usable Privacy and Security
, pp. 65-76
-
-
Iachello, G.1
Smith, I.2
Consolvo, S.3
Chen, M.4
Abowd, G.D.5
-
29
-
-
33846267542
-
-
Information technology, Security techniques, Code of practice for information security management
-
Information technology - Security techniques - Code of practice for information security management, http://www.iso.org/iso/en/CatalogueDetailPage. CatalogueDetail?CSNUMBER=39612&ICSl=35&ICS2=40&ICS3=
-
-
-
-
30
-
-
0027634119
-
An Investigation of the Therac-25 Accidents
-
July
-
Nancy Leveson and Clark S. Turner, "An Investigation of the Therac-25 Accidents", IEEE Computer, Vol. 26, No. 7, July 1993, pp. 18-41.
-
(1993)
IEEE Computer
, vol.26
, Issue.7
, pp. 18-41
-
-
Leveson, N.1
Turner, C.S.2
-
33
-
-
0012127229
-
Intrusion and Intrusion Detection
-
John McHugh, "Intrusion and Intrusion Detection", IJIS, 2001, v. 1, pp 14-35.
-
(2001)
IJIS
, vol.1
, pp. 14-35
-
-
McHugh, J.1
-
34
-
-
33846313058
-
When User Studies Attack: Evaluating Security By Intentionally Attacking Users
-
Pittsburgh, Pennsylvania
-
Robert Miller, Simson Garfinkel, Filippo Menczer, Robert Kraut, "When User Studies Attack: Evaluating Security By Intentionally Attacking Users", 2005 Symposium On Usable Privacy and Security, Pittsburgh, Pennsylvania.
-
(2005)
Symposium On Usable Privacy and Security
-
-
Miller, R.1
Garfinkel, S.2
Menczer, F.3
Kraut, R.4
-
35
-
-
39149113346
-
-
People Can Use, Lome Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
-
Fabian Monrose and Michael K. Reiter, Graphical Passwords, Security and Usability: Designing Secure Systems that People Can Use, Lome Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
(2005)
Graphical Passwords, Security and Usability: Designing Secure Systems that
-
-
Monrose, F.1
Reiter, M.K.2
-
36
-
-
84928578565
-
Positive Feedback and the Madness of Crowds
-
California, United Stages, pp
-
Hilarie Orman and Richard Schroeppel, "Positive Feedback and the Madness of Crowds", Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, California, United Stages, pp. 134-138.
-
Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead
, pp. 134-138
-
-
Orman, H.1
Schroeppel, R.2
-
38
-
-
36549056853
-
Designing Systems That People Will Trust
-
People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
-
Andrew S. Patrick, Pamela Briggs, and Stephen Marsh, "Designing Systems That People Will Trust", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
(2005)
Security and Usability: Designing Secure Systems that
-
-
Patrick, A.S.1
Briggs, P.2
Marsh, S.3
-
39
-
-
0033489645
-
Optimistic Security: A New Access Control Paradigm
-
Ontario, Canada, pp
-
Dean Povey, "Optimistic Security: A New Access Control Paradigm", Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, Ontario, Canada, pp. 40-45.
-
Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills
, pp. 40-45
-
-
Povey, D.1
-
40
-
-
0004223940
-
-
Cambridge, UK; Cambridge University Press
-
J. Reason, Human Error, Cambridge, UK; Cambridge University Press, 1990.
-
(1990)
Human Error
-
-
Reason, J.1
-
41
-
-
35348885452
-
Evaluating Authentication Mechanisms
-
People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
-
Karen Renaud, "Evaluating Authentication Mechanisms", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
(2005)
Security and Usability: Designing Secure Systems that
-
-
Renaud, K.1
-
42
-
-
80052807260
-
Firefox and the Worry-free Web
-
People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
-
Blake Ross, "Firefox and the Worry-free Web", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
(2005)
Security and Usability: Designing Secure Systems that
-
-
Ross, B.1
-
43
-
-
33846275685
-
-
Anne Saita, Password protection no match for Easter egg lovers, http://searchsecurity.techtarget.com/originalContent/0,289142, sid14_gci960468,00.html
-
Anne Saita, "Password protection no match for Easter egg lovers", http://searchsecurity.techtarget.com/originalContent/0,289142, sid14_gci960468,00.html
-
-
-
-
45
-
-
33846285595
-
Usable Security
-
People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
-
M. Angela Sasse and Ivan Flechais, "Usable Security ", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
(2005)
Security and Usability: Designing Secure Systems that
-
-
Angela Sasse, M.1
Flechais, I.2
-
47
-
-
33846294975
-
-
October 15
-
Bruce Schneier, Crypto-Gram Newsletter, October 15, 2000, http://www.schneier.com/crypto-gram-0010.html.
-
(2000)
-
-
Schneier, B.1
Newsletter, C.2
-
50
-
-
35348892019
-
Design for Usability
-
People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
-
Bruce Tognazzini, "Design for Usability", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
(2005)
Security and Usability: Designing Secure Systems that
-
-
Tognazzini, B.1
-
54
-
-
0242708745
-
Pretty Good Persuasion: A First Step Towards Effective Password Security in the Real World
-
New Mexico, pp
-
Dirk Weirich and Martina Angela Sasse, "Pretty Good Persuasion: A First Step Towards Effective Password Security in the Real World", Proceedings of the 2001 Workshop on New Security Paradigms, Cloudcroft, New Mexico, pp. 137-143.
-
Proceedings of the 2001 Workshop on New Security Paradigms, Cloudcroft
, pp. 137-143
-
-
Weirich, D.1
Angela Sasse, M.2
-
55
-
-
0028016986
-
Security Properties of the SWORD Secure DBMS design
-
Alabama, USA, September
-
Simon R. Wiseman, "Security Properties of the SWORD Secure DBMS design", Database Security, VII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Lake Guntersville, Alabama, USA, September 1993, pp 181-196.
-
(1993)
Database Security, VII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Lake Guntersville
, pp. 181-196
-
-
Wiseman, S.R.1
-
57
-
-
33846323486
-
The Memorability and Security of Passwords
-
People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
-
Jeff Yan, Alan Blackwell, Ross Anderson, and Alasdair Grant, "The Memorability and Security of Passwords", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
(2005)
Security and Usability: Designing Secure Systems that
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
58
-
-
12844271558
-
Aligning Security and Usability
-
September, October
-
Ka-Ping Yee, "Aligning Security and Usability", IEEE Security and Privacy, vol. 02, no. 5, pp. 48-55, September - October 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 48-55
-
-
Yee, K.1
-
59
-
-
84926001904
-
User-Centered Security
-
California, United States, pp
-
Mary Ellen Zurko and Richard T. Simon, "User-Centered Security", Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, California, United States, pp. 27-33.
-
Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead
, pp. 27-33
-
-
Ellen Zurko, M.1
Simon, R.T.2
-
60
-
-
84940100462
-
A User-Centered, Modular Authorization Service Built on an RBA Foundation
-
Mary Ellen Zurko, Rich Simon, and Tom Sanfilippo, "A User-Centered, Modular Authorization Service Built on an RBA Foundation", IEEE Symposium on Security and Privacy, 1999, pp. 57-71.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Ellen Zurko, M.1
Simon, R.2
Sanfilippo, T.3
-
61
-
-
85084159885
-
Jonah: Experience Implementing PKIX Reference Freeware
-
Washington, DC, August
-
th USENIX Security Symposium", Washington, DC, August 1999, pp. 185-200.
-
(1999)
th USENIX Security Symposium
, pp. 185-200
-
-
Zurko, M.E.1
Wray, J.2
Morrison, I.3
Shanzer, M.4
Crane, M.5
Booth, P.6
McDermott, E.7
Macek, W.8
Graham, A.9
Wade, J.10
Sandlin, T.11
-
62
-
-
84948973276
-
-
th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 2002.
-
th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 2002.
-
-
-
-
63
-
-
33846321698
-
IBM Lotus Notes/Domino: Embedding Seurity in Collaborative Applications
-
People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed, O'Reilly, August
-
Mary Ellen Zurko, "IBM Lotus Notes/Domino: Embedding Seurity in Collaborative Applications", Security and Usability: Designing Secure Systems that People Can Use, Lorrie Faith Cranor and Simson Garfinkle, ed., O'Reilly, August 2005.
-
(2005)
Security and Usability: Designing Secure Systems that
-
-
Ellen Zurko, M.1
|