메뉴 건너뛰기




Volumn 149, Issue , 2006, Pages 20-31

Intentional access management: Making access control usable for end-users

Author keywords

Access control; Intentional access management; Usability; WebDAV

Indexed keywords

COMPUTER PROGRAMMING; DECISION MAKING; PROBLEM SOLVING; SOFTWARE PROTOTYPING; USABILITY ENGINEERING; USER INTERFACES; WEB SERVICES;

EID: 34250753855     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1143120.1143124     Document Type: Conference Paper
Times cited : (31)

References (19)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • Adams, A. and Sasse, M. A. Users are not the enemy. Comm. ACM, vol. 42, no. 12, 1999, 41-46.
    • (1999) Comm. ACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 3
    • 22144439749 scopus 로고    scopus 로고
    • Brostoff, S., Sasse, M. A., Chadwick, D., Cunningham, J., Mbanaso, U., and Otenko, S. R-What? Development of a role-based access control (RBAC) policy-writing tool for e-scientists. Software: Practice and Experience, 35, no. 9, July 2005, 835-856.
    • Brostoff, S., Sasse, M. A., Chadwick, D., Cunningham, J., Mbanaso, U., and Otenko, S. R-What? Development of a role-based access control (RBAC) policy-writing tool for e-scientists. Software: Practice and Experience, vol. 35, no. 9, July 2005, 835-856.
  • 6
    • 34250706703 scopus 로고    scopus 로고
    • WebDAV benefits for the enterprise and its denizens
    • Dmreview.com, June 27
    • Dussault, L. WebDAV benefits for the enterprise and its denizens. DM Direct Newsletter, Dmreview.com, June 27, 2003. http://www.dmreview.com/ article_sub.cfm?articleID=6971
    • (2003) DM Direct Newsletter
    • Dussault, L.1
  • 8
    • 34250789588 scopus 로고    scopus 로고
    • Jakarta Slide project
    • Jakarta Slide project, http://jakarta.apache.org/slide/
  • 11
    • 19944391032 scopus 로고    scopus 로고
    • Improving user-interface dependability through mitigation of human error
    • Maxion, R.A. and Reeder, R.W. Improving user-interface dependability through mitigation of human error. International Journal of Human-Computer Studies, vol. 63, 2005, 23-50.
    • (2005) International Journal of Human-Computer Studies , vol.63 , pp. 23-50
    • Maxion, R.A.1    Reeder, R.W.2
  • 14
    • 0036005221 scopus 로고    scopus 로고
    • Towards a typology of Internet users and online privacy concerns
    • Sheehan, K. Towards a typology of Internet users and online privacy concerns. The Information Society, vol. 18, 2002, 21-23.
    • (2002) The Information Society , vol.18 , pp. 21-23
    • Sheehan, K.1
  • 15
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of POP 5.0
    • Usenix Assoc
    • Whitten, A. and Tygar, J.D. Why Johnny can't encrypt: a usability evaluation of POP 5.0. In Proceedings of 8th Usenix Security Symposium, Usenix Assoc., 1999, 169-184.
    • (1999) Proceedings of 8th Usenix Security Symposium , pp. 169-184
    • Whitten, A.1    Tygar, J.D.2
  • 17
    • 84944056366 scopus 로고    scopus 로고
    • User interaction design for secure systems
    • Proceedings of 4th International Conference on Information and Communications Security, Deng R. et al, eds, Springer
    • Yee, K.-P. User interaction design for secure systems. In Proceedings of 4th International Conference on Information and Communications Security, Deng R. et al., eds., LNCS 2513 Springer, 2002,278-290; http://zestv.ca/sid.
    • (2002) LNCS , vol.2513 , pp. 278-290
    • Yee, K.-P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.