메뉴 건너뛰기




Volumn 93, Issue , 2005, Pages 25-34

Two experiences designing for effective security

Author keywords

Effective security; Event based architecture; Impromptu; Peer to peer filesharing application; Privacy practices; Theoretical security; Usable security; Vavoom; Visualization; YANCEES

Indexed keywords

EFFECTIVE SECURITY; EVENT-BASED; FILE SHARING APPLICATION; PEER TO PEER; PRIVACY PRACTICES; THEORETICAL SECURITY; USABLE SECURITY; YANCEES;

EID: 77953740422     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1073001.1073004     Document Type: Conference Paper
Times cited : (16)

References (25)
  • 1
    • 0001655450 scopus 로고    scopus 로고
    • Design and evaluation of a wide-area event notification service
    • August
    • Carzaniga, A., Rosenblum, D. S., and Wolf, A. L. 2001. Design and Evaluation of a Wide-Area Event Notification Service. ACM Transactions on Computer Systems, August, Vol. 19 Issue 3, pp. 332-383.
    • (2001) ACM Transactions on Computer Systems , vol.19 , Issue.3 , pp. 332-383
    • Carzaniga, A.1    Rosenblum, D.S.2    Wolf, A.L.3
  • 2
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Denning, D. 1987. An Intrusion-Detection Model. IEEE Trans. Software Engineering, 13(2), 222-232.
    • (1987) IEEE Trans. Software Engineering , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 5
    • 19944399587 scopus 로고    scopus 로고
    • Privacy, security and risk and danger and secrecy and trust and identity and morality and power: Understanding collective information practices: Irvine
    • CA: Institute for Software Research
    • Dourish, P., & Anderson, K. (2005). Privacy, security and risk and danger and secrecy and trust and identity and morality and power: Understanding collective information practices: Irvine, CA: Institute for Software Research. Technical Report UCI-ISR- 05-1.
    • (2005) Technical Report UCI-ISR-05-1
    • Dourish, P.1    Anderson, K.2
  • 6
  • 7
    • 84900482702 scopus 로고    scopus 로고
    • Security in the wild: User strategies for managing security as an everyday, practical problem
    • Dourish, P., Grinter, R., Delgado de la Flor, J., and Joseph, M. (2004). Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Personal and Ubiquitous Computing, 8(6), 391-401.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 391-401
    • Dourish, P.1    Grinter, R.2    Delgado De La Flor, J.3    Joseph, M.4
  • 8
    • 0242696305 scopus 로고    scopus 로고
    • An approach to usable security based on event monitoring and visualization
    • Virginia Beach, VA. New York: ACM
    • Dourish, P. and Redmiles, D. (2002). An Approach to Usable Security Based on Event Monitoring and Visualization. Proceedings of the New Security Paradigms Workshop 2002 (Virginia Beach, VA). New York: ACM.
    • (2002) Proceedings of the New Security Paradigms Workshop 2002
    • Dourish, P.1    Redmiles, D.2
  • 11
    • 0033489646 scopus 로고    scopus 로고
    • Security service level agreements: Quantifiable security for the enterprise?
    • (Ontario, Canada), IEEE
    • Henning, R. 1999. Security Service Level Agreements: Quantifiable Security for the Enterprise? New Security Paradigm Workshop (Ontario, Canada), 54-60. IEEE.
    • (1999) New Security Paradigm Workshop , pp. 54-60
    • Henning, R.1
  • 15
    • 0023866666 scopus 로고
    • A prototype real-time intrusion-detection export system
    • New York: IEEE
    • Lunt, T. and Jagannathan. 1988. A Prototype Real-Time Intrusion-Detection Export System. Proc. IEEE Symposium on Security and Privacy, 59-66. New York: IEEE.
    • (1988) Proc. IEEE Symposium on Security and Privacy , pp. 59-66
    • Lunt, T.1    Jagannathan2
  • 16
    • 0028409472 scopus 로고
    • Technological frames: Making sense of information technology in organizations
    • Orlikowski, W. J., & Gash, D. C. (1994). Technological frames: Making sense of information technology in organizations. ACM Transactions on Information Systems (TOIS), 12(2), 174-207.
    • (1994) ACM Transactions on Information Systems (TOIS) , vol.12 , Issue.2 , pp. 174-207
    • Orlikowski, W.J.1    Gash, D.C.2
  • 19
    • 0036005221 scopus 로고    scopus 로고
    • Towards a typology of internet users and online privacy concerns
    • Sheehan, K. 2002. Towards a Typology of Internet Users and Online Privacy Concerns. The Information Society, 18, 21-23.
    • (2002) The Information Society , vol.18 , pp. 21-23
    • Sheehan, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.