메뉴 건너뛰기




Volumn 15, Issue 5, 2007, Pages 394-407

Usable set-up of runtime security policies

Author keywords

Business policy; Data security; Internet; Java

Indexed keywords

COMPUTER SOFTWARE; INTERNET; JAVA PROGRAMMING LANGUAGE; SOFTWARE ENGINEERING;

EID: 34948857053     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220710831134     Document Type: Article
Times cited : (5)

References (26)
  • 3
    • 33845531822 scopus 로고    scopus 로고
    • "Design principles and patterns for computer systems that are simultaneously secure and usable"
    • PhD thesis, Massachusetts Institute of Technology, Cambridge, MA
    • Garfinkel, S.L. (2005), "Design principles and patterns for computer systems that are simultaneously secure and usable", PhD thesis, Massachusetts Institute of Technology, Cambridge, MA.
    • (2005)
    • Garfinkel, S.L.1
  • 5
    • 33646679400 scopus 로고    scopus 로고
    • "To download or not to download: An examination of computer security decision making"
    • Hardee, J.B., West, R. and Mayhorn, C.B. (2006), "To download or not to download: An examination of computer security decision making", Interactions, Vol. 13 No. 3, pp. 32-7.
    • (2006) Interactions , vol.13 , Issue.3 , pp. 32-37
    • Hardee, J.B.1    West, R.2    Mayhorn, C.B.3
  • 7
    • 0034872904 scopus 로고    scopus 로고
    • "Trust-adapted enforcement of security policies in distributed component-structured applications"
    • IEEE, Piscataway, NJ
    • Herrmann, P. and Krumm, H. (2001), "Trust-adapted enforcement of security policies in distributed component-structured applications", Proceedings of the 6th IEEE Symposium on Computers and Communications, IEEE, Piscataway, NJ, pp. 2-8.
    • (2001) Proceedings of the 6th IEEE Symposium on Computers and Communications , pp. 2-8
    • Herrmann, P.1    Krumm, H.2
  • 8
    • 84926032225 scopus 로고    scopus 로고
    • Technical report, Linköpings universitet, Department of Computer and Information Science, Stockholm
    • Herzog, A. (2006), "A pilot study on setting an applet access control policy", Technical report, Linköpings universitet, Department of Computer and Information Science, Stockholm.
    • (2006) "A Pilot Study on Setting an Applet Access Control Policy"
    • Herzog, A.1
  • 9
    • 18844394496 scopus 로고    scopus 로고
    • "Performance of the Java security manager"
    • Herzog, A. and Shahmehri, N. (2005), "Performance of the Java security manager", Computers & Security, Vol. 24 No. 3, pp. 192-207.
    • (2005) Computers & Security , vol.24 , Issue.3 , pp. 192-207
    • Herzog, A.1    Shahmehri, N.2
  • 12
  • 15
    • 0004257599 scopus 로고
    • Morgan Kaufmann Publisher, San Fransisco, CA
    • Nielsen, J. (1993), Usability Engineering, Morgan Kaufmann Publisher, San Fransisco, CA.
    • (1993) Usability Engineering
    • Nielsen, J.1
  • 16
    • 0001775576 scopus 로고
    • "Heuristic evaluation"
    • in Nielsen, J. and Mack, R.L. (Eds), Wiley, New York, NY
    • Nielsen, J. (1994), "Heuristic evaluation", in Nielsen, J. and Mack, R.L. (Eds), Usability Inspection Methods, Wiley, New York, NY, pp. 25-62.
    • (1994) Usability Inspection Methods , pp. 25-62
    • Nielsen, J.1
  • 18
    • 0016555241 scopus 로고
    • "The protection of information in computer systems"
    • Saltzer, J.H. and Schroeder, M.D. (1975), "The protection of information in computer systems", Proceedings of the IEEE, Vol. 63 No. 9, pp. 1278-308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 19
    • 0035387175 scopus 로고    scopus 로고
    • "Transforming the weakest link - A human/computer interaction approach to usable and effective security"
    • Sasse, M.A., Brostoff, S. and Weirich, D. (2003), "Transforming the weakest link - a human/computer interaction approach to usable and effective security", BT Technology Journal, Vol. 19 No. 3, pp. 122-31.
    • (2003) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 22
    • 0242283462 scopus 로고    scopus 로고
    • Morgan Kaufmann Publishers, San Fransisco, CA
    • Snyder, C. (2003), Paper Prototyping, Morgan Kaufmann Publishers, San Fransisco, CA.
    • (2003) Paper Prototyping
    • Snyder, C.1
  • 23
    • 19944372231 scopus 로고    scopus 로고
    • "Making security usable"
    • PhD thesis, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, CMU-CS-04-135
    • Whitten A. (2004), "Making security usable", PhD thesis, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, CMU-CS-04-135.
    • (2004)
    • Whitten, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.