메뉴 건너뛰기




Volumn 4663 LNCS, Issue PART 2, 2007, Pages 141-155

Usability challenges in security and privacy policy-authoring interfaces

Author keywords

Policy; Policy authoring; Privacy; Security; Usability

Indexed keywords

DATA PRIVACY; PUBLIC POLICY; UBIQUITOUS COMPUTING; COMPUTER PRIVACY; DIGITAL STORAGE; DISTRIBUTED COMPUTER SYSTEMS; SECURITY OF DATA; USABILITY ENGINEERING; USER INTERFACES;

EID: 38049152588     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74800-7_11     Document Type: Conference Paper
Times cited : (46)

References (19)
  • 1
    • 19944382845 scopus 로고    scopus 로고
    • Privacy in information technology: Designing to enable privacy policy management in organizations
    • Karat, J., Karat, C.-M., Brodie, C., Feng, J.: Privacy in information technology: Designing to enable privacy policy management in organizations. International Journal of Human-Computer Studies 63(1-2), 153-174 (2005)
    • (2005) International Journal of Human-Computer Studies , vol.63 , Issue.1-2 , pp. 153-174
    • Karat, J.1    Karat, C.-M.2    Brodie, C.3    Feng, J.4
  • 2
    • 34250753855 scopus 로고    scopus 로고
    • Intentional access management: Making access control usable for end-users
    • New York, NY, pp, ACM Press, New York
    • Cao, X., Iverson, L.: Intentional access management: Making access control usable for end-users. In: Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS 2006), New York, NY, pp. 20-31. ACM Press, New York (2006)
    • (2006) Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS , pp. 20-31
    • Cao, X.1    Iverson, L.2
  • 4
    • 19944391032 scopus 로고    scopus 로고
    • Improving user-interface dependability through mitigation of human error
    • Maxion, R.A., Reeder, R.W.: Improving user-interface dependability through mitigation of human error. International Journal of Human-Computer Studies 63(1-2), 25-50 (2005)
    • (2005) International Journal of Human-Computer Studies , vol.63 , Issue.1-2 , pp. 25-50
    • Maxion, R.A.1    Reeder, R.W.2
  • 6
    • 85087242390 scopus 로고    scopus 로고
    • U.S. Senate Sergeant at Arms: Report on the investigation into improper access to the Senate Judiciary Committee's computer system (2004), available at http://judiciary.senate.gov/test imony.cfm?id=1085\&wit_id=2514
    • U.S. Senate Sergeant at Arms: Report on the investigation into improper access to the Senate Judiciary Committee's computer system (2004), available at http://judiciary.senate.gov/test imony.cfm?id=1085\&wit_id=2514
  • 8
    • 38049157384 scopus 로고    scopus 로고
    • Lederer, S., Mankoff, J., Dey, A.K., Beckmann, C.P.: Managing personal information disclosure in ubiquitous computing environments. Technical Report UCB-CSD-03-1257, University of California, Berkeley, Berkeley, CA (2003), available at http://www.eecs.berkeley.edu/Pubs/TechRpts/2003/CSD-03-1257.pdf
    • Lederer, S., Mankoff, J., Dey, A.K., Beckmann, C.P.: Managing personal information disclosure in ubiquitous computing environments. Technical Report UCB-CSD-03-1257, University of California, Berkeley, Berkeley, CA (2003), available at http://www.eecs.berkeley.edu/Pubs/TechRpts/2003/CSD-03-1257.pdf
  • 10
    • 84904310464 scopus 로고    scopus 로고
    • Al-Shaer, E.S., Hamed, H.H.: Firewall Policy Advisor for anomaly discovery and rule editing. In: Marshall, A., Agoulmine, N. (eds.) MMNS 2003. LNCS, 2839, pp. 17-30. Springer, Heidelberg (2003)
    • Al-Shaer, E.S., Hamed, H.H.: Firewall Policy Advisor for anomaly discovery and rule editing. In: Marshall, A., Agoulmine, N. (eds.) MMNS 2003. LNCS, vol. 2839, pp. 17-30. Springer, Heidelberg (2003)
  • 11
    • 38049159119 scopus 로고    scopus 로고
    • Ericsson, K.A., Simon, H.A.: Protocol Analysis: Verbal Reports as Data. Revised edn., MIT Press, Cambridge, MA (1993)
    • Ericsson, K.A., Simon, H.A.: Protocol Analysis: Verbal Reports as Data. Revised edn., MIT Press, Cambridge, MA (1993)
  • 12
    • 34250717425 scopus 로고    scopus 로고
    • An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
    • New York, NY, July, ACM Press, New York () 2006
    • Brodie, C., Karat, C.M., Karat, J.: An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. In: Proceedings of the 2006 Symposium on Usable Privacy and Security (SOUPS 2006), New York, NY, July 2006, pp. 8-19. ACM Press, New York (2006)
    • (2006) Proceedings of the 2006 Symposium on Usable Privacy and Security (SOUPS , pp. 8-19
    • Brodie, C.1    Karat, C.M.2    Karat, J.3
  • 15
    • 37249076243 scopus 로고    scopus 로고
    • Towards everyday privacy for ubiquitous computing
    • Technical Report UCB-CSD-03-1283, University of California, Berkeley, Berkeley, CA , available at
    • Lederer, S., Hong, J.I., Jiang, X., Dey, A.K., Landay, J.A., Mankoff, J.: Towards everyday privacy for ubiquitous computing. Technical Report UCB-CSD-03-1283, University of California, Berkeley, Berkeley, CA (2003), available at http://www.eecs.berkeley.edu/Pubs/TechRpts/2003/CSD-03-1283.pdf
    • (2003)
    • Lederer, S.1    Hong, J.I.2    Jiang, X.3    Dey, A.K.4    Landay, J.A.5    Mankoff, J.6
  • 16
    • 38049111702 scopus 로고    scopus 로고
    • Web Privacy with P3P. O'Reilly
    • Sebastopol, CA 2002
    • Cranor, L.F.: Web Privacy with P3P. O'Reilly, Sebastopol, CA (2002)
    • Cranor, L.F.1
  • 17
    • 0032629460 scopus 로고    scopus 로고
    • A user-centered, modular authorization service built on an RBAC foundation
    • Los Alamitos, CA, May, IEEE Computer Society Press, Los Alamitos
    • Zurko, M.E., Simon, R., Sanfilippo, T.: A user-centered, modular authorization service built on an RBAC foundation. In: Proceedings 1999 IEEE Symposium on Security and Privacy, Los Alamitos, CA, May 1999, pp. 57-71. IEEE Computer Society Press, Los Alamitos (1999)
    • (1999) Proceedings 1999 IEEE Symposium on Security and Privacy , pp. 57-71
    • Zurko, M.E.1    Simon, R.2    Sanfilippo, T.3
  • 18
    • 0025403275 scopus 로고
    • Improving a human-computer dialogue
    • Molich, R., Nielsen, J.: Improving a human-computer dialogue. Communications of the ACM 33(3), 338-348 (1990)
    • (1990) Communications of the ACM , vol.33 , Issue.3 , pp. 338-348
    • Molich, R.1    Nielsen, J.2
  • 19
    • 19944367736 scopus 로고    scopus 로고
    • Personal privacy through understanding and action: Five pitfalls for designers
    • Lederer, S., Hong, J., Dey, A.K., Landay, J.: Personal privacy through understanding and action: Five pitfalls for designers. Personal and Ubiquitous Computing 8(6), 440-454 (2004)
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 440-454
    • Lederer, S.1    Hong, J.2    Dey, A.K.3    Landay, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.