-
1
-
-
19944394275
-
Bridging the gap between organizational and user perspectives of security in the clinical domain
-
Adams A., and Blandford A. Bridging the gap between organizational and user perspectives of security in the clinical domain. International Journal of Human Computer Studies 63 1-2 (2005) 175-202
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 175-202
-
-
Adams, A.1
Blandford, A.2
-
2
-
-
0043232732
-
Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
-
Adams A., and Sasse M.A. Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures. Communications of the ACM 42 12 (1999) 41-46
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
5
-
-
55649099897
-
-
Federal Aviation Administration, U.S. Department of Transportation [accessed April 2007]
-
Allendoerfer K.R. Human factors considerations for passwords and other user identification techniques, part 2: field study, results and analysis, document reference DOT/FAA/TC-06/09 (2006), Federal Aviation Administration, U.S. Department of Transportation. http://hf.tc.faa.gov/technotes/dot_faa_tc_06_09.pdf [accessed April 2007]
-
(2006)
Human factors considerations for passwords and other user identification techniques, part 2: field study, results and analysis, document reference DOT/FAA/TC-06/09
-
-
Allendoerfer, K.R.1
-
8
-
-
55649118506
-
-
[accessed April 2008]
-
Australian Government. Dealing with identity theft (2006). http://www.ag.gov.au/www/agd/rwpattach.nsf/VAP/(03995EABC73F94816C2AF4AA2645824B)∼ID+Theft+DL+Booklet+Final+Art.pdf/$file/ID+Theft+DL+Booklet+Final+Art.pdf [accessed April 2008]
-
(2006)
Dealing with identity theft
-
-
Australian Government1
-
9
-
-
0000453135
-
What is autobiographical memory?
-
Conway M.A., Rubin D.C., Spinnler H., and Wagenaar W.A. (Eds), Kluwer Academic Publishers
-
Baddeley A. What is autobiographical memory?. In: Conway M.A., Rubin D.C., Spinnler H., and Wagenaar W.A. (Eds). Theoretical perspectives on autobiographical memory (1992), Kluwer Academic Publishers
-
(1992)
Theoretical perspectives on autobiographical memory
-
-
Baddeley, A.1
-
10
-
-
33846813917
-
Information lifecycle security risk assessment: a tool for closing security gaps
-
Bernard R. Information lifecycle security risk assessment: a tool for closing security gaps. Computers & Security 26 1 (2007) 26-30
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 26-30
-
-
Bernard, R.1
-
14
-
-
0035387175
-
Ten strikes and you're out: increasing the number of login attempts can improve password usability approach to usable and effective security
-
Brostoff S., and Sasse M.A. Ten strikes and you're out: increasing the number of login attempts can improve password usability approach to usable and effective security. BT Technology Journal 19 3 (2001) 122-131
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Brostoff, S.1
Sasse, M.A.2
-
24
-
-
55649100567
-
-
Dourish P, Delgado de la Flor J, Joseph M. Security as a practical problem: some preliminary observations of everyday mental models, 2003 http://www.andrewpatrick.ca/CHI2003/HCISEC/hcisec-workshop-dourish.pdf.
-
Dourish P, Delgado de la Flor J, Joseph M. Security as a practical problem: some preliminary observations of everyday mental models, 2003 http://www.andrewpatrick.ca/CHI2003/HCISEC/hcisec-workshop-dourish.pdf.
-
-
-
-
25
-
-
0026256545
-
Computer verification of human users' identity: a theoretical model and some evaluation criteria
-
Fåk V. Computer verification of human users' identity: a theoretical model and some evaluation criteria. Computers & Security 10 7 (1991) 626-636
-
(1991)
Computers & Security
, vol.10
, Issue.7
, pp. 626-636
-
-
Fåk, V.1
-
31
-
-
15744404682
-
Management of risks in the information age
-
Gerber M., and von Solms R. Management of risks in the information age. Computers & Security 24 (2005) 16-30
-
(2005)
Computers & Security
, vol.24
, pp. 16-30
-
-
Gerber, M.1
von Solms, R.2
-
32
-
-
55649091884
-
-
Germain R. Large scale systems in biometrics. In: Jain A, Bolle R, Pankanti S, editors. Personal identification in a networked society 1999. Kluwer Academic Publishers.
-
Germain R. Large scale systems in biometrics. In: Jain A, Bolle R, Pankanti S, editors. Personal identification in a networked society 1999. Kluwer Academic Publishers.
-
-
-
-
36
-
-
55649087161
-
-
Paper 44, Berkeley Center for Law and Technology [accessed April 2008]
-
Hoofnagle C. Measuring identity theft at top banks. Paper 44 (2008), Berkeley Center for Law and Technology. http://repositories.cdlib.org/bclt/lts/44 [accessed April 2008]
-
(2008)
Measuring identity theft at top banks
-
-
Hoofnagle, C.1
-
37
-
-
55649086472
-
-
International Civil Aviation Organisation, Machine readable travel documents, technical report, development of a logical data structure for optical capacity expansion technologies, revision 1.7; 2004a.
-
International Civil Aviation Organisation, Machine readable travel documents, technical report, development of a logical data structure for optical capacity expansion technologies, revision 1.7; 2004a.
-
-
-
-
38
-
-
55649094266
-
-
International Civil Aviation Organisation, Machine readable travel documents, technical report, PKI for machine readable travel documents offering ICC read-only access, version 1.1; 2004b.
-
International Civil Aviation Organisation, Machine readable travel documents, technical report, PKI for machine readable travel documents offering ICC read-only access, version 1.1; 2004b.
-
-
-
-
40
-
-
55649124383
-
-
ISO/IEC 15408-1. Information technology security techniques - evaluation criteria for IT security, part 1: introduction and general model; 2005.
-
ISO/IEC 15408-1. Information technology security techniques - evaluation criteria for IT security, part 1: introduction and general model; 2005.
-
-
-
-
41
-
-
55649105926
-
-
ISO/IEC 19785-1. Information technology - common biometric exchange formats framework, part 1; 2006.
-
ISO/IEC 19785-1. Information technology - common biometric exchange formats framework, part 1; 2006.
-
-
-
-
42
-
-
55649105035
-
-
ISO/IEC 27001. Information technology - security techniques - information security management systems - requirements; 2005.
-
ISO/IEC 27001. Information technology - security techniques - information security management systems - requirements; 2005.
-
-
-
-
43
-
-
55649114708
-
-
ISO/IEC 27002. Information technology - information techniques - code of practice for information security management; 2005.
-
ISO/IEC 27002. Information technology - information techniques - code of practice for information security management; 2005.
-
-
-
-
44
-
-
55649089926
-
-
ISO/IEC 7816-4. Identification cards - integrated circuits cards, organization, security and commands for interchange; 2005.
-
ISO/IEC 7816-4. Identification cards - integrated circuits cards, organization, security and commands for interchange; 2005.
-
-
-
-
46
-
-
0000217847
-
Introduction to biometrics
-
Jain A.K., Bolle R., and Pankanti S. (Eds), Kluwer Academic Publishers
-
Jain A.K., Bolle R., and Pankanti S. Introduction to biometrics. In: Jain A.K., Bolle R., and Pankanti S. (Eds). Biometrics: personal identification in a networked society (1999), Kluwer Academic Publishers 1-41
-
(1999)
Biometrics: personal identification in a networked society
, pp. 1-41
-
-
Jain, A.K.1
Bolle, R.2
Pankanti, S.3
-
48
-
-
33847249519
-
-
Juels A, Molnar D, Wagner D. Security and privacy issues in e-passports. In: Proceedings of the first international conference on security and privacy for emerging areas in communications networks; 2005. p. 74-88.
-
Juels A, Molnar D, Wagner D. Security and privacy issues in e-passports. In: Proceedings of the first international conference on security and privacy for emerging areas in communications networks; 2005. p. 74-88.
-
-
-
-
49
-
-
0028422616
-
Identity authentication in heterogeneous computing environments: a competitive study for an integrated framework
-
Kanungo S. Identity authentication in heterogeneous computing environments: a competitive study for an integrated framework. Computers & Security 13 3 (1994) 231-253
-
(1994)
Computers & Security
, vol.13
, Issue.3
, pp. 231-253
-
-
Kanungo, S.1
-
51
-
-
55649124613
-
-
King MM. Rebus passwords. In: Proceedings of the seventh annual computer security applications conference; 1991. p. 239-43.
-
King MM. Rebus passwords. In: Proceedings of the seventh annual computer security applications conference; 1991. p. 239-43.
-
-
-
-
53
-
-
55649088071
-
Bitfrost: the one laptop per child security model
-
[accessed April 2008]
-
Krstić I., and Garfinkel S.L. Bitfrost: the one laptop per child security model. Symposium on usable privacy and security (2007). http://cups.cs.cmu.edu/soups/2007/proceedings/p132_krstic.pdf [accessed April 2008]
-
(2007)
Symposium on usable privacy and security
-
-
Krstić, I.1
Garfinkel, S.L.2
-
54
-
-
0345764837
-
Improving user security behaviour
-
:685-92.
-
Leech J. Improving user security behaviour. Computers & Security 22 8 (2003) :685-92.
-
(2003)
Computers & Security
, vol.22
, Issue.8
-
-
Leech, J.1
-
56
-
-
1642298729
-
-
UK National Physical Laboratory and San Jose State University, Centre for Mathematics and Scientific Computing National Physical Laboratory, UK [accessed April 2008]
-
Mansfield A.J., and Wayman J.L. Best practices in testing and reporting performance of biometric devices version 2.01 (August 2002), UK National Physical Laboratory and San Jose State University, Centre for Mathematics and Scientific Computing National Physical Laboratory, UK. http://www.cesg.gov.uk/site/ast/biometrics/media/BestPractice.pdf [accessed April 2008]
-
(2002)
Best practices in testing and reporting performance of biometric devices version 2.01
-
-
Mansfield, A.J.1
Wayman, J.L.2
-
57
-
-
0036030112
-
Impact of artificial "gummy" fingers on fingerprint systems
-
Proceedings of international society for optical engineering [accessed April 2008]
-
Matsumoto T., Matsumoto H., Yamada K., and Hoshino S. Impact of artificial "gummy" fingers on fingerprint systems. Proceedings of international society for optical engineering. Optical security and counterfeit deterrence techniques vol. 4677 (2002) 275-289. http://www.lfca.net/Fingerprint-System-Security-Issues.pdf [accessed April 2008]
-
(2002)
Optical security and counterfeit deterrence techniques
, vol.4677
, pp. 275-289
-
-
Matsumoto, T.1
Matsumoto, H.2
Yamada, K.3
Hoshino, S.4
-
59
-
-
2342548557
-
-
John Wiley & Sons, Inc, New York, NY
-
Mitnick K.D., Simon W.L., and Simon W. The art of deception: controlling the human element of security (2002), John Wiley & Sons, Inc, New York, NY
-
(2002)
The art of deception: controlling the human element of security
-
-
Mitnick, K.D.1
Simon, W.L.2
Simon, W.3
-
67
-
-
84869031038
-
HCI and security systems
-
National Research Council Canada, Institute of Information Technology
-
Patrick A.S., Long A.C., and Flinn S. HCI and security systems. CHI 2003 conference proceedings, Fort Lauderdale (2003), National Research Council Canada, Institute of Information Technology
-
(2003)
CHI 2003 conference proceedings, Fort Lauderdale
-
-
Patrick, A.S.1
Long, A.C.2
Flinn, S.3
-
70
-
-
55649094257
-
The usability of security devices
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly Media Inc
-
Piazzalunga U., Salvaneschi P., and Coffetti P. The usability of security devices. In: Cranor L.F., and Garfinkel S. (Eds). Security and usability (2005), O'Reilly Media Inc
-
(2005)
Security and usability
-
-
Piazzalunga, U.1
Salvaneschi, P.2
Coffetti, P.3
-
72
-
-
33751109662
-
Quantifying the quality of web authentication mechanisms - a usability perspective
-
Renaud K. Quantifying the quality of web authentication mechanisms - a usability perspective. Journal of Web Engineering 3 2 (2004) 95-123
-
(2004)
Journal of Web Engineering
, vol.3
, Issue.2
, pp. 95-123
-
-
Renaud, K.1
-
73
-
-
35348885452
-
Evaluating authentication mechanisms
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly Media Inc
-
Renaud K. Evaluating authentication mechanisms. In: Cranor L.F., and Garfinkel S. (Eds). Security and usability (2005), O'Reilly Media Inc
-
(2005)
Security and usability
-
-
Renaud, K.1
-
75
-
-
0035387175
-
Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security
-
Netherlands: Springer
-
Sasse M.A., Brostoff S., and Weirich D. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technology Journal 19 3 (2001) Netherlands: Springer
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
78
-
-
55649098862
-
Cyber-risk management: technical and insurance controls for enterprise-level security
-
Tipton H.F., and Krause M. (Eds), CRC Press LLC
-
Siegel C.A., Sagalow T.R., and Serritella P. Cyber-risk management: technical and insurance controls for enterprise-level security. In: Tipton H.F., and Krause M. (Eds). Information security management handbook (2003), CRC Press LLC
-
(2003)
Information security management handbook
-
-
Siegel, C.A.1
Sagalow, T.R.2
Serritella, P.3
-
80
-
-
55649110955
-
-
Enterprise Security, British Computer Society [accessed April 2008]
-
Stevens T. Identity, identity, identity. Enterprise Security (2007), British Computer Society. http://www.bcs.org/server.php?show=conWebDoc.11113 [accessed April 2008]
-
(2007)
Identity, identity, identity
-
-
Stevens, T.1
-
85
-
-
55649110954
-
-
UK Biometrics Working Group, The UK Office of the E-Envoy, UK Government Cabinet Office [accessed April 2008]
-
UK Biometrics Working Group. Use of Biometrics for identification and authentication - advice on product selection (2002), The UK Office of the E-Envoy, UK Government Cabinet Office. http://www.cesg.gov.uk/site/ast/biometrics/media/BiometricsAdvice.pdf [accessed April 2008]
-
(2002)
Use of Biometrics for identification and authentication - advice on product selection
-
-
-
86
-
-
55649084201
-
Personal internet security
-
Authority of the House of Lords, The Stationery Office Limited, London [accessed April 2008]
-
UK Government, House of lords science and technology committee. Personal internet security. Report vol. 1 (2007), Authority of the House of Lords, The Stationery Office Limited, London. http://www.publications.parliament.uk/pa/ld200607/ldselect/ldsctech/165/165i.pdf [accessed April 2008]
-
(2007)
Report
, vol.1
-
-
UK Government, House of lords science and technology committee,1
-
90
-
-
36049049404
-
An introduction to biometric authentication systems
-
Wayman J., Jain A., Maltoni D., and Maio D. (Eds), Springer-Verlag London Limited
-
Wayman J., Jain A., Maltoni D., and Maio D. An introduction to biometric authentication systems. In: Wayman J., Jain A., Maltoni D., and Maio D. (Eds). Biometric Systems: technology, design and performance (2005), Springer-Verlag London Limited
-
(2005)
Biometric Systems: technology, design and performance
-
-
Wayman, J.1
Jain, A.2
Maltoni, D.3
Maio, D.4
-
91
-
-
68549122947
-
-
Weingart SH, White SR, Arnold WC, Double GP. An evaluation system for the physical security of computing systems. In: Sixth Annual Computer Security Applications Conference. 1990, p. 232-43.
-
Weingart SH, White SR, Arnold WC, Double GP. An evaluation system for the physical security of computing systems. In: Sixth Annual Computer Security Applications Conference. 1990, p. 232-43.
-
-
-
-
92
-
-
0038335740
-
-
Weirich D, Sasse MA. Persuasive password security. In: Conference on human factors in computing systems, CHI '01 extended abstracts on human factors in computing systems; 2001. p. 139-40.
-
Weirich D, Sasse MA. Persuasive password security. In: Conference on human factors in computing systems, CHI '01 extended abstracts on human factors in computing systems; 2001. p. 139-40.
-
-
-
-
94
-
-
85084161247
-
-
Whitten A, Tygar JD. Why Johnny can't encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the eighth USENIX security symposium; 1999.
-
Whitten A, Tygar JD. Why Johnny can't encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the eighth USENIX security symposium; 1999.
-
-
-
-
96
-
-
34547294916
-
The memorability and security of passwords
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly Media Inc
-
Yan J., Blackwell A., Anderson R., and Grant A. The memorability and security of passwords. In: Cranor L.F., and Garfinkel S. (Eds). Security and usability (2005), O'Reilly Media Inc
-
(2005)
Security and usability
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
99
-
-
55649124609
-
Secure interaction design and the principle of least authority
-
[accessed April 2008]
-
Yee K.P. Secure interaction design and the principle of least authority. CHI 2003 workshop on human-computer interaction and security systems (2003). http://www.andrewpatrick.ca/CHI2003/HCISEC/hcisec-workshop-yee.pdf [accessed April 2008]
-
(2003)
CHI 2003 workshop on human-computer interaction and security systems
-
-
Yee, K.P.1
-
101
-
-
33846277633
-
-
Zurko ME. User-centred security: stepping up to the grand challenge. In: Proceedings of the 21st annual computer security applications conference; 2005, p. 187-202.
-
Zurko ME. User-centred security: stepping up to the grand challenge. In: Proceedings of the 21st annual computer security applications conference; 2005, p. 187-202.
-
-
-
|