-
1
-
-
0037240812
-
Misuse cases, use cases with hostile intent
-
I.F. Alexander, "Misuse cases, use cases with hostile intent," IEEE Software vol 20(1), pp. 58-66, 2000.
-
(2000)
IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.F.1
-
2
-
-
33845264120
-
Defining security requirements through misuse actions
-
Santiago, Chile
-
E.B. Fernandez, M. VanHilst, M.M. Larrondo-Petrie, and S. Huang, "Defining security requirements through misuse actions", in Proc. IFIP International Workshop on Advanced Software Engineering (IWASE 2006), Santiago, Chile.
-
Proc. IFIP International Workshop on Advanced Software Engineering (IWASE 2006)
-
-
Fernandez, E.B.1
VanHilst, M.2
Larrondo-Petrie, M.M.3
Huang, S.4
-
3
-
-
0003562445
-
-
Lawrence Erlbaum Associates, Inc, Mahwah, NJ
-
D.A. Norman and S.W. Draper, User Centered System Design; New Perspectives on Human-Computer Interaction, Lawrence Erlbaum Associates, Inc., Mahwah, NJ, 1986.
-
(1986)
User Centered System Design; New Perspectives on Human-Computer Interaction
-
-
Norman, D.A.1
Draper, S.W.2
-
4
-
-
0004257599
-
-
Morgan Kaufmann Publishers Inc, San Francisco, CA
-
J. Nielsen, Usability Engineering, Morgan Kaufmann Publishers Inc., San Francisco, CA, 1993.
-
(1993)
Usability Engineering
-
-
Nielsen, J.1
-
5
-
-
0012488670
-
-
Wiley, New York
-
J. Preece, Y. Rogers, and H. Sharp, Interaction design: beyond human-computer interaction, Wiley, New York, 2000.
-
(2000)
Interaction design: Beyond human-computer interaction
-
-
Preece, J.1
Rogers, Y.2
Sharp, H.3
-
6
-
-
62749144690
-
-
B. Schneiderman, 19980 Eight golden rules of user interface design, http://mail.gnome.org/archives/gnome-gui-list/1998-November/ msg00074.html
-
B. Schneiderman, (19980 "Eight golden rules of user interface design", http://mail.gnome.org/archives/gnome-gui-list/1998-November/ msg00074.html
-
-
-
-
7
-
-
0001293083
-
Guerrilla HCI: Using discount usability engineering to penetrate the intimidation barrier
-
Academic Press, Inc, Orlando, FL
-
J. Nielsen, "Guerrilla HCI: using discount usability engineering to penetrate the intimidation barrier", Cost-justifying usability, Academic Press, Inc., Orlando, FL, 1994.
-
(1994)
Cost-justifying usability
-
-
Nielsen, J.1
-
8
-
-
62749146483
-
Security Evaluation of the Sequoia Voting System
-
Computer Security Group:, Computer Security Group, Dept. of Computer Science, University of California, Santa Barbara
-
Computer Security Group: "Security Evaluation of the Sequoia Voting System", Public Report, Computer Security Group, Dept. of Computer Science, University of California, Santa Barbara, 2007.
-
(2007)
Public Report
-
-
-
9
-
-
62749094824
-
-
California Secretary of State: Red Team Report on the Diebold Election Systems, Public Report of Top-to-Bottom Electronic Election Systems Review, 2007.
-
California Secretary of State: "Red Team Report on the Diebold Election Systems", Public Report of Top-to-Bottom Electronic Election Systems Review, 2007.
-
-
-
-
11
-
-
84869434087
-
An Analysis of the Hart Intercivic DAU eSlate
-
E. Proebstel, S.,Riddle, F. Hsu, and J. Cummins, "An Analysis of the Hart Intercivic DAU eSlate", Electronic Voting Technology Workshop, EVT'07, 2007.
-
(2007)
Electronic Voting Technology Workshop, EVT'07
-
-
Proebstel, E.1
Riddle, S.2
Hsu, F.3
Cummins, J.4
-
12
-
-
57449114683
-
GEMS Tabulation Database Design Issues in Relation to Voting Systems Certification Standards
-
T.P. Ryan, and C. Hoke, "GEMS Tabulation Database Design Issues in Relation to Voting Systems Certification Standards" Electronic Voting Technology Workshop, EVT'07, 2007
-
(2007)
Electronic Voting Technology Workshop, EVT'07
-
-
Ryan, T.P.1
Hoke, C.2
|