메뉴 건너뛰기




Volumn , Issue , 2008, Pages 543-552

A user study of policy creation in a flexible access-control system

Author keywords

Access control; Discretionary access control; Distributed access control; Policy creation; Smartphones

Indexed keywords

CONTROL SYSTEMS; HUMAN ENGINEERING; SECURITY SYSTEMS; SIGNAL ENCODING;

EID: 57649195178     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1357054.1357143     Document Type: Conference Paper
Times cited : (30)

References (15)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • Oct
    • M. Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, Oct. 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 3-21
    • Abadi, M.1
  • 7
    • 38049159118 scopus 로고    scopus 로고
    • Intentional access management: Making access control usable for end-users
    • X. Cao and L. Iverson. Intentional access management: Making access control usable for end-users. In Symposium On Usable Privacy and Security, 2006.
    • (2006) Symposium On Usable Privacy and Security
    • Cao, X.1    Iverson, L.2
  • 10
    • 19944367736 scopus 로고    scopus 로고
    • Personal privacy through understanding and action: Five pitfalls for designers
    • S. Lederer, J. I. Hong, A. K. Dey, and J. A. Landay. Personal privacy through understanding and action: Five pitfalls for designers. Personal and Ubiquitous Computing, 8(6):440-454, 2004.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 440-454
    • Lederer, S.1    Hong, J.I.2    Dey, A.K.3    Landay, J.A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.