-
1
-
-
22144439749
-
"'R-what?' development of a role-based access control policy-writing tool for e-scientists"
-
Brostoff, S., Sasse, M.A., Chadwick, D., Cunningham, J., Mbanaso, U. and Otenko, S. (2005), "'R-what?' development of a role-based access control policy-writing tool for e-scientists", Software - Practice & Experience, Vol. 35, pp. 835-56.
-
(2005)
Software - Practice & Experience
, vol.35
, pp. 835-856
-
-
Brostoff, S.1
Sasse, M.A.2
Chadwick, D.3
Cunningham, J.4
Mbanaso, U.5
Otenko, S.6
-
2
-
-
84944048132
-
"The ponder policy specification language"
-
Springer New York, NY Springer, New York, NY
-
Damianou, N., Dulay, N., Lupu, E. and Sloman, M. (2001), "The ponder policy specification language", Proceedings of the International Workshop on Policies for Distributed Systems and Networks (Policy'01), Volume LNCS 1995, Springer, New York, NY, pp. 18-38.
-
(2001)
Proceedings of the International Workshop on Policies for Distributed Systems and Networks (Policy'01), Volume LNCS 1995
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
3
-
-
33845531822
-
"Design principles and patterns for computer systems that are simultaneously secure and usable"
-
PhD thesis, Massachusetts Institute of Technology, Cambridge, MA
-
Garfinkel, S.L. (2005), "Design principles and patterns for computer systems that are simultaneously secure and usable", PhD thesis, Massachusetts Institute of Technology, Cambridge, MA.
-
(2005)
-
-
Garfinkel, S.L.1
-
4
-
-
0003801299
-
-
2nd ed., Addison-Wesley, Reading, MA
-
Gong, L., Ellison, G. and Dageforde, M. (2003), Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed., Addison-Wesley, Reading, MA.
-
(2003)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation
-
-
Gong, L.1
Ellison, G.2
Dageforde, M.3
-
5
-
-
33646679400
-
"To download or not to download: An examination of computer security decision making"
-
Hardee, J.B., West, R. and Mayhorn, C.B. (2006), "To download or not to download: An examination of computer security decision making", Interactions, Vol. 13 No. 3, pp. 32-7.
-
(2006)
Interactions
, vol.13
, Issue.3
, pp. 32-37
-
-
Hardee, J.B.1
West, R.2
Mayhorn, C.B.3
-
6
-
-
0034446927
-
"A secure execution framework for Java"
-
ACM Press, New York, NY
-
Hauswirth, M., Kerer, C. and Kurmanowytsch, R. (2000), "A secure execution framework for Java", Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS'00), ACM Press, New York, NY, pp. 43-52.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS'00)
, pp. 43-52
-
-
Hauswirth, M.1
Kerer, C.2
Kurmanowytsch, R.3
-
7
-
-
0034872904
-
"Trust-adapted enforcement of security policies in distributed component-structured applications"
-
IEEE, Piscataway, NJ
-
Herrmann, P. and Krumm, H. (2001), "Trust-adapted enforcement of security policies in distributed component-structured applications", Proceedings of the 6th IEEE Symposium on Computers and Communications, IEEE, Piscataway, NJ, pp. 2-8.
-
(2001)
Proceedings of the 6th IEEE Symposium on Computers and Communications
, pp. 2-8
-
-
Herrmann, P.1
Krumm, H.2
-
8
-
-
84926032225
-
-
Technical report, Linköpings universitet, Department of Computer and Information Science, Stockholm
-
Herzog, A. (2006), "A pilot study on setting an applet access control policy", Technical report, Linköpings universitet, Department of Computer and Information Science, Stockholm.
-
(2006)
"A Pilot Study on Setting an Applet Access Control Policy"
-
-
Herzog, A.1
-
9
-
-
18844394496
-
"Performance of the Java security manager"
-
Herzog, A. and Shahmehri, N. (2005), "Performance of the Java security manager", Computers & Security, Vol. 24 No. 3, pp. 192-207.
-
(2005)
Computers & Security
, vol.24
, Issue.3
, pp. 192-207
-
-
Herzog, A.1
Shahmehri, N.2
-
10
-
-
33845528583
-
"A usability study of security policy management"
-
in Fischer-Hübner, S., Rannenberg, K. and Louise Yngström, S.L. (Eds) Springer, New York, NY
-
Herzog, A. and Shahmehri, N. (2006), "A usability study of security policy management", in Fischer-Hübner, S., Rannenberg, K. and Louise Yngström, S.L. (Eds), Security and Privacy in Dynamic Environments, Proceedings of the 21st International Information Security Conference (IFIP TC-11) (SEC'06), Springer, New York, NY, pp. 296-306.
-
(2006)
Security and Privacy in Dynamic Environments, Proceedings of the 21st International Information Security Conference (IFIP TC-11) (SEC'06)
, pp. 296-306
-
-
Herzog, A.1
Shahmehri, N.2
-
11
-
-
36249015376
-
"Usability and security of personal firewalls"
-
Springer, New York, NY
-
Herzog, A. and Shahmehri, N. (2007), "Usability and security of personal firewalls", Proceedings of the International Information Security Conference (IFIP TC-11) (SEC'07), Springer, New York, NY.
-
(2007)
Proceedings of the International Information Security Conference (IFIP TC-11) (SEC'07)
-
-
Herzog, A.1
Shahmehri, N.2
-
12
-
-
0347025921
-
"Security and human computer interfaces"
-
Johnston, J., Eloff, J.H.P. and Labuschagne, L. (2003), "Security and human computer interfaces", Computers & Security, Vol. 22 No. 8, pp. 675-84.
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 675-684
-
-
Johnston, J.1
Eloff, J.H.P.2
Labuschagne, L.3
-
13
-
-
0242276201
-
"A policy based approach to security for the semantic web"
-
Springer, New York, NY
-
Kagal, L., Finin, T. and Joshi, A. (2003), "A policy based approach to security for the semantic web", Proceedings of the International Semantic Web Conference (ISWC'03), Volume LNCS2870, Springer, New York, NY, pp. 402-18.
-
(2003)
Proceedings of the International Semantic Web Conference (ISWC'03), Volume LNCS2870
, pp. 402-418
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
15
-
-
0004257599
-
-
Morgan Kaufmann Publisher, San Fransisco, CA
-
Nielsen, J. (1993), Usability Engineering, Morgan Kaufmann Publisher, San Fransisco, CA.
-
(1993)
Usability Engineering
-
-
Nielsen, J.1
-
16
-
-
0001775576
-
"Heuristic evaluation"
-
in Nielsen, J. and Mack, R.L. (Eds), Wiley, New York, NY
-
Nielsen, J. (1994), "Heuristic evaluation", in Nielsen, J. and Mack, R.L. (Eds), Usability Inspection Methods, Wiley, New York, NY, pp. 25-62.
-
(1994)
Usability Inspection Methods
, pp. 25-62
-
-
Nielsen, J.1
-
18
-
-
0016555241
-
"The protection of information in computer systems"
-
Saltzer, J.H. and Schroeder, M.D. (1975), "The protection of information in computer systems", Proceedings of the IEEE, Vol. 63 No. 9, pp. 1278-308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
19
-
-
0035387175
-
"Transforming the weakest link - A human/computer interaction approach to usable and effective security"
-
Sasse, M.A., Brostoff, S. and Weirich, D. (2003), "Transforming the weakest link - a human/computer interaction approach to usable and effective security", BT Technology Journal, Vol. 19 No. 3, pp. 122-31.
-
(2003)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
20
-
-
84893105662
-
"Requirements for policy languages for trust negotiation"
-
IEEE, Piscataway, NJ
-
Seamons, K.E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills, H. and Yu, L. (2002), "Requirements for policy languages for trust negotiation", Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (Policy'02), IEEE, Piscataway, NJ, pp. 68-79.
-
(2002)
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (Policy'02)
, pp. 68-79
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobson, J.6
Mills, H.7
Yu, L.8
-
21
-
-
0003486463
-
-
4th ed., Addison-Wesley, Reading, MA
-
Shneiderman, B. and Plaisant, C. (2004), Designing the User Interface, 4th ed., Addison-Wesley, Reading, MA.
-
(2004)
Designing the User Interface
-
-
Shneiderman, B.1
Plaisant, C.2
-
22
-
-
0242283462
-
-
Morgan Kaufmann Publishers, San Fransisco, CA
-
Snyder, C. (2003), Paper Prototyping, Morgan Kaufmann Publishers, San Fransisco, CA.
-
(2003)
Paper Prototyping
-
-
Snyder, C.1
-
23
-
-
19944372231
-
"Making security usable"
-
PhD thesis, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, CMU-CS-04-135
-
Whitten A. (2004), "Making security usable", PhD thesis, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, CMU-CS-04-135.
-
(2004)
-
-
Whitten, A.1
-
25
-
-
84944056366
-
"User interaction design for secure systems"
-
Springer, New York, NY
-
Yee, K-P. (2002), "User interaction design for secure systems", Proceedings of the International Conference on Information and Communications Security (ICICS'02), Springer, New York, NY, pp. 278-90.
-
(2002)
Proceedings of the International Conference on Information and Communications Security (ICICS'02)
, pp. 278-290
-
-
Yee, K.-P.1
-
26
-
-
0032629460
-
"A user-centered, modular authorization service built on an RBAC foundation"
-
IEEE, Piscataway, NJ
-
Zurko, M.E., Simon, R. and Sanfilippo, T. (1999), "A user-centered, modular authorization service built on an RBAC foundation", Proceedings of the IEEE Symposium on Security and Privacy, IEEE, Piscataway, NJ, pp. 57-71.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.E.1
Simon, R.2
Sanfilippo, T.3
|