|
Volumn 149, Issue , 2006, Pages 145-155
|
Seeing further: Extending visualization as a basis for usable security
|
Author keywords
Configuration in action; Dynamic visualizations; Effective security; History; Peer to peer file sharing; Theoretical security; Usable security; User and media characterization; User study
|
Indexed keywords
DYNAMIC VISUALIZATIONS;
EFFECTIVE SECURITY;
MEDIA CHARACTERIZATION;
PEER-TO-PEER FILE SHARING;
THEORETICAL SECURITY;
USABLE SECURITY;
USER STUDY;
DISTRIBUTED COMPUTER SYSTEMS;
DYNAMIC MODELS;
INFORMATION USE;
INTERACTIVE COMPUTER SYSTEMS;
PROBLEM SOLVING;
USER INTERFACES;
SECURITY OF DATA;
|
EID: 34250879822
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1143120.1143138 Document Type: Conference Paper |
Times cited : (35)
|
References (15)
|