-
3
-
-
19944382845
-
Privacy in information technology: Designing to enable privacy policy management in organizations
-
July
-
J. Karat, C.-M. Karat, C. Brodie, and J. Feng. Privacy in information technology: Designing to enable privacy policy management in organizations. International Journal of Human-Computer Studies, 63(1-2):153-174, July 2005.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 153-174
-
-
Karat, J.1
Karat, C.-M.2
Brodie, C.3
Feng, J.4
-
4
-
-
57649223089
-
-
B. W. Lampson. Protection. Operating Systems Review, 8(1): 18-24, January 1974. Reprint of the original from Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems (Princeton University, March, 1971), 437-443.
-
B. W. Lampson. Protection. Operating Systems Review, 8(1): 18-24, January 1974. Reprint of the original from Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems (Princeton University, March, 1971), 437-443.
-
-
-
-
5
-
-
19944391032
-
Improving user-interface dependability through mitigation of human error
-
July
-
R. A. Maxion and R. W. Reeder. Improving user-interface dependability through mitigation of human error. International Journal of Human-Computer Studies, 63(1-2):25-50, July 2005.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 25-50
-
-
Maxion, R.A.1
Reeder, R.W.2
-
6
-
-
57649241576
-
-
M. C. Mont, R. Thyne, and P. Bramhall. Privacy enforcement with HP Select Access for regulatory compliance. Technical Report HPL-2005-10, HP Laboratories Bristol, Bristol, UK, January 2005. Available at http: //www.hpl.hp.com/ techreports/2005/HPL-2005-10.pdf. Accessed on January 10, 2008.
-
M. C. Mont, R. Thyne, and P. Bramhall. Privacy enforcement with HP Select Access for regulatory compliance. Technical Report HPL-2005-10, HP Laboratories Bristol, Bristol, UK, January 2005. Available at http: //www.hpl.hp.com/ techreports/2005/HPL-2005-10.pdf. Accessed on January 10, 2008.
-
-
-
-
7
-
-
34250879822
-
Seeing further: Extending visualization as a basis for usable security
-
J. Rode, C. Johansson, P. DiGioia, R. S. Filho, K. Nies, D. H. Nguyen, J. Ren, P. Dourish, and D. Redmiles. Seeing further: Extending visualization as a basis for usable security. In Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS 2006), pages 145-155, 2006.
-
(2006)
Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS 2006)
, pp. 145-155
-
-
Rode, J.1
Johansson, C.2
DiGioia, P.3
Filho, R.S.4
Nies, K.5
Nguyen, D.H.6
Ren, J.7
Dourish, P.8
Redmiles, D.9
-
8
-
-
57649236708
-
Adage system overview
-
The Open Group Research Institute, //.Accessed on September 20, 2006
-
The Open Group Research Institute. Adage system overview. Available at http: //www.memesoft. com/adage/SystemSpec.ps.Accessed on September 20, 2006.
-
Available at http
-
-
-
9
-
-
57649161065
-
-
U.S. Senate Sergeant at Arms. Report on the investigation into improper access to the Senate Judiciary Committee's computer system, March 2004. Available at http: //judiciary.senate.gov/testimony.cfm?id=1085&wit-id=2514. Accessed on January 10, 2008.
-
U.S. Senate Sergeant at Arms. Report on the investigation into improper access to the Senate Judiciary Committee's computer system, March 2004. Available at http: //judiciary.senate.gov/testimony.cfm?id=1085&wit-id=2514. Accessed on January 10, 2008.
-
-
-
-
10
-
-
57649153883
-
Adage usability testing results: Formal testing affinity mapping and questionnaire
-
Accessed on September 20, 2006
-
M. E. Zurko. Adage usability testing results: Formal testing affinity mapping and questionnaire. Available at http: //www.memesoft.com/adage/affinity. ps. Accessed on September 20, 2006.
-
Available at http
-
-
Zurko, M.E.1
-
11
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
Los Alamitos, CA, May
-
M. E. Zurko, R. Simon, and T. Sanfilippo. A user-centered, modular authorization service built on an RBAC foundation. In Proceedings 1999 IEEE Symposium on Security and Privacy, pages 57-71, Los Alamitos, CA, May 1999.
-
(1999)
Proceedings 1999 IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.E.1
Simon, R.2
Sanfilippo, T.3
|