-
1
-
-
0043232732
-
Users are not the enemy
-
Adams, A. and Sasse, M. A. Users are not the enemy. Comm. ACM, vol. 42, no. 12, 1999, 41-46.
-
(1999)
Comm. ACM
, vol.42
, Issue.12
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
12844272841
-
In search of usable security: Five lessons from the field
-
Balfanz, D., Durfee, G., Smetters, D.K., and Grinter, R.E. In search of usable security: five lessons from the field. IEEE Security & Privacy Magazine, vol. 2, no. 5, 2004, 19-24.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.5
, pp. 19-24
-
-
Balfanz, D.1
Durfee, G.2
Smetters, D.K.3
Grinter, R.E.4
-
3
-
-
22144439749
-
-
Brostoff, S., Sasse, M. A., Chadwick, D., Cunningham, J., Mbanaso, U., and Otenko, S. R-What? Development of a role-based access control (RBAC) policy-writing tool for e-scientists. Software: Practice and Experience, 35, no. 9, July 2005, 835-856.
-
Brostoff, S., Sasse, M. A., Chadwick, D., Cunningham, J., Mbanaso, U., and Otenko, S. R-What? Development of a role-based access control (RBAC) policy-writing tool for e-scientists. Software: Practice and Experience, vol. 35, no. 9, July 2005, 835-856.
-
-
-
-
4
-
-
14844352124
-
-
RFC 3744. May
-
Clemm, G., Reschke, J., Sedlar, E., and Whitehead, J. Web Distributed Authoring and Versioning (WebDAV) Access Control Protocol. RFC 3744. May 2004. http://www.ietf.org/rfc/rfc3744.txt.
-
(2004)
Web Distributed Authoring and Versioning (WebDAV) Access Control Protocol
-
-
Clemm, G.1
Reschke, J.2
Sedlar, E.3
Whitehead, J.4
-
6
-
-
34250706703
-
WebDAV benefits for the enterprise and its denizens
-
Dmreview.com, June 27
-
Dussault, L. WebDAV benefits for the enterprise and its denizens. DM Direct Newsletter, Dmreview.com, June 27, 2003. http://www.dmreview.com/ article_sub.cfm?articleID=6971
-
(2003)
DM Direct Newsletter
-
-
Dussault, L.1
-
7
-
-
0003899482
-
-
RFC 2518. Feb
-
Goland, Y., Whitehead, E., Faizi, A., Carter, S.R., and Jensen, D. HTTP Extensions for Distributed Authoring - WEBDAV. RFC 2518. Feb. 1999. http://www.ietf.org/rfc/rfc2518.txt.
-
(1999)
HTTP Extensions for Distributed Authoring - WEBDAV
-
-
Goland, Y.1
Whitehead, E.2
Faizi, A.3
Carter, S.R.4
Jensen, D.5
-
8
-
-
34250789588
-
-
Jakarta Slide project
-
Jakarta Slide project, http://jakarta.apache.org/slide/
-
-
-
-
9
-
-
14844322854
-
Know why your access was denied: Regulating feedback for usable security
-
Washington DC, Oct 25-29
-
Kapadia, A., Sampemane, G., and Campbell, R. Know why your access was denied: regulating feedback for usable security. In Proceedings of the 11th ACM conference on Computers and Communications Security (CCS), Washington DC, Oct 25-29 2004.
-
(2004)
Proceedings of the 11th ACM conference on Computers and Communications Security (CCS)
-
-
Kapadia, A.1
Sampemane, G.2
Campbell, R.3
-
13
-
-
0030086382
-
Role-based access control models
-
February
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., and Youman, C.E. Role-based access control models. IEEE Computer, vol. 29, no. 2, February 1996, 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
14
-
-
0036005221
-
Towards a typology of Internet users and online privacy concerns
-
Sheehan, K. Towards a typology of Internet users and online privacy concerns. The Information Society, vol. 18, 2002, 21-23.
-
(2002)
The Information Society
, vol.18
, pp. 21-23
-
-
Sheehan, K.1
-
15
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of POP 5.0
-
Usenix Assoc
-
Whitten, A. and Tygar, J.D. Why Johnny can't encrypt: a usability evaluation of POP 5.0. In Proceedings of 8th Usenix Security Symposium, Usenix Assoc., 1999, 169-184.
-
(1999)
Proceedings of 8th Usenix Security Symposium
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.D.2
-
16
-
-
0038375554
-
Harnessing curiosity to increase correctness in end-user programming
-
Ft. Lauderdale, FL, April
-
Wilson, A., Burnett, M., Beckwith, L., Granatir, O., Casburn, L., Cook, C., Durham, M., and Rothermel, G. Harnessing curiosity to increase correctness in end-user programming. In Proceedings of ACM Conference on Human Factors in Computing Systems, Ft. Lauderdale, FL, April 2003.
-
(2003)
Proceedings of ACM Conference on Human Factors in Computing Systems
-
-
Wilson, A.1
Burnett, M.2
Beckwith, L.3
Granatir, O.4
Casburn, L.5
Cook, C.6
Durham, M.7
Rothermel, G.8
-
17
-
-
84944056366
-
User interaction design for secure systems
-
Proceedings of 4th International Conference on Information and Communications Security, Deng R. et al, eds, Springer
-
Yee, K.-P. User interaction design for secure systems. In Proceedings of 4th International Conference on Information and Communications Security, Deng R. et al., eds., LNCS 2513 Springer, 2002,278-290; http://zestv.ca/sid.
-
(2002)
LNCS
, vol.2513
, pp. 278-290
-
-
Yee, K.-P.1
-
19
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
9-12 May
-
Zurko, M. E., Simon, R., and Sanfilippo, T. A user-centered, modular authorization service built on an RBAC foundation. In Proceedings of the IEEE Symposium on Security and Privacy, 9-12 May 1999, 57-71.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.E.1
Simon, R.2
Sanfilippo, T.3
|