메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1473-1482

Expandable grids for visualizing and authoring computer security policies

Author keywords

Expandable Grid; File permissions; Policy; Security; Visualization

Indexed keywords

HUMAN ENGINEERING; SECURITY OF DATA; SECURITY SYSTEMS; USER INTERFACES; VISUALIZATION; WINDOWS;

EID: 56449119921     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1357054.1357285     Document Type: Conference Paper
Times cited : (103)

References (11)
  • 3
    • 19944382845 scopus 로고    scopus 로고
    • Privacy in information technology: Designing to enable privacy policy management in organizations
    • July
    • J. Karat, C.-M. Karat, C. Brodie, and J. Feng. Privacy in information technology: Designing to enable privacy policy management in organizations. International Journal of Human-Computer Studies, 63(1-2):153-174, July 2005.
    • (2005) International Journal of Human-Computer Studies , vol.63 , Issue.1-2 , pp. 153-174
    • Karat, J.1    Karat, C.-M.2    Brodie, C.3    Feng, J.4
  • 4
    • 57649223089 scopus 로고    scopus 로고
    • B. W. Lampson. Protection. Operating Systems Review, 8(1): 18-24, January 1974. Reprint of the original from Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems (Princeton University, March, 1971), 437-443.
    • B. W. Lampson. Protection. Operating Systems Review, 8(1): 18-24, January 1974. Reprint of the original from Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems (Princeton University, March, 1971), 437-443.
  • 5
    • 19944391032 scopus 로고    scopus 로고
    • Improving user-interface dependability through mitigation of human error
    • July
    • R. A. Maxion and R. W. Reeder. Improving user-interface dependability through mitigation of human error. International Journal of Human-Computer Studies, 63(1-2):25-50, July 2005.
    • (2005) International Journal of Human-Computer Studies , vol.63 , Issue.1-2 , pp. 25-50
    • Maxion, R.A.1    Reeder, R.W.2
  • 6
    • 57649241576 scopus 로고    scopus 로고
    • M. C. Mont, R. Thyne, and P. Bramhall. Privacy enforcement with HP Select Access for regulatory compliance. Technical Report HPL-2005-10, HP Laboratories Bristol, Bristol, UK, January 2005. Available at http: //www.hpl.hp.com/ techreports/2005/HPL-2005-10.pdf. Accessed on January 10, 2008.
    • M. C. Mont, R. Thyne, and P. Bramhall. Privacy enforcement with HP Select Access for regulatory compliance. Technical Report HPL-2005-10, HP Laboratories Bristol, Bristol, UK, January 2005. Available at http: //www.hpl.hp.com/ techreports/2005/HPL-2005-10.pdf. Accessed on January 10, 2008.
  • 8
    • 57649236708 scopus 로고    scopus 로고
    • Adage system overview
    • The Open Group Research Institute, //.Accessed on September 20, 2006
    • The Open Group Research Institute. Adage system overview. Available at http: //www.memesoft. com/adage/SystemSpec.ps.Accessed on September 20, 2006.
    • Available at http
  • 9
    • 57649161065 scopus 로고    scopus 로고
    • U.S. Senate Sergeant at Arms. Report on the investigation into improper access to the Senate Judiciary Committee's computer system, March 2004. Available at http: //judiciary.senate.gov/testimony.cfm?id=1085&wit-id=2514. Accessed on January 10, 2008.
    • U.S. Senate Sergeant at Arms. Report on the investigation into improper access to the Senate Judiciary Committee's computer system, March 2004. Available at http: //judiciary.senate.gov/testimony.cfm?id=1085&wit-id=2514. Accessed on January 10, 2008.
  • 10
    • 57649153883 scopus 로고    scopus 로고
    • Adage usability testing results: Formal testing affinity mapping and questionnaire
    • Accessed on September 20, 2006
    • M. E. Zurko. Adage usability testing results: Formal testing affinity mapping and questionnaire. Available at http: //www.memesoft.com/adage/affinity. ps. Accessed on September 20, 2006.
    • Available at http
    • Zurko, M.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.