-
1
-
-
0001655450
-
Design and evaluation of a wide-area event notification service
-
August
-
Carzaniga, A., Rosenblum, D. S., and Wolf, A. L. 2001. Design and Evaluation of a Wide-Area Event Notification Service. ACM Transactions on Computer Systems, August, Vol. 19 Issue 3, pp. 332-383.
-
(2001)
ACM Transactions on Computer Systems
, vol.19
, Issue.3
, pp. 332-383
-
-
Carzaniga, A.1
Rosenblum, D.S.2
Wolf, A.L.3
-
2
-
-
0023294428
-
An intrusion-detection model
-
Denning, D. 1987. An Intrusion-Detection Model. IEEE Trans. Software Engineering, 13(2), 222-232.
-
(1987)
IEEE Trans. Software Engineering
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
4
-
-
19944365607
-
In the eye of the beholder: A visualization-base approach to information system security
-
to appear
-
de Paula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D., et al. (2005). In the eye of the beholder: A visualization-base approach to information system security. International Journal of Human-Computer Studies (to appear).
-
(2005)
International Journal of Human-computer Studies
-
-
De Paula, R.1
Ding, X.2
Dourish, P.3
Nies, K.4
Pillet, B.5
Redmiles, D.6
-
5
-
-
19944399587
-
Privacy, security and risk and danger and secrecy and trust and identity and morality and power: Understanding collective information practices: Irvine
-
CA: Institute for Software Research
-
Dourish, P., & Anderson, K. (2005). Privacy, security and risk and danger and secrecy and trust and identity and morality and power: Understanding collective information practices: Irvine, CA: Institute for Software Research. Technical Report UCI-ISR- 05-1.
-
(2005)
Technical Report UCI-ISR-05-1
-
-
Dourish, P.1
Anderson, K.2
-
7
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday, practical problem
-
Dourish, P., Grinter, R., Delgado de la Flor, J., and Joseph, M. (2004). Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Personal and Ubiquitous Computing, 8(6), 391-401.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.2
Delgado De La Flor, J.3
Joseph, M.4
-
8
-
-
0242696305
-
An approach to usable security based on event monitoring and visualization
-
Virginia Beach, VA. New York: ACM
-
Dourish, P. and Redmiles, D. (2002). An Approach to Usable Security Based on Event Monitoring and Visualization. Proceedings of the New Security Paradigms Workshop 2002 (Virginia Beach, VA). New York: ACM.
-
(2002)
Proceedings of the New Security Paradigms Workshop 2002
-
-
Dourish, P.1
Redmiles, D.2
-
9
-
-
0003899482
-
HTTP extensions for distributed authoring - WEBDAV
-
February
-
Goland, Y., Whitehead, E., Faizi, A., Carter, S. and Jensen, D., 1999. HTTP Extensions for Distributed Authoring - WEBDAV. Internet Engineering Task Force, Internet Proposed Standard Request for Comments 2518, February.
-
(1999)
Internet Engineering Task Force, Internet Proposed Standard Request for Comments 2518
-
-
Goland, Y.1
Whitehead, E.2
Faizi, A.3
Carter, S.4
Jensen, D.5
-
11
-
-
0033489646
-
Security service level agreements: Quantifiable security for the enterprise?
-
(Ontario, Canada), IEEE
-
Henning, R. 1999. Security Service Level Agreements: Quantifiable Security for the Enterprise? New Security Paradigm Workshop (Ontario, Canada), 54-60. IEEE.
-
(1999)
New Security Paradigm Workshop
, pp. 54-60
-
-
Henning, R.1
-
14
-
-
0242528324
-
Creating an infrastructure for ubiquitous awareness
-
INTERACT 2001-Tokyo, Japan
-
Kantor, M., Redmiles, D. 2001. Creating an Infrastructure for Ubiquitous Awareness, Eight IFIP TC 13 Conference on Human-Computer Interaction (INTERACT 2001-Tokyo, Japan), 431- 438.
-
(2001)
Eight IFIP TC 13 Conference on Human-computer Interaction
, pp. 431-438
-
-
Kantor, M.1
Redmiles, D.2
-
15
-
-
0023866666
-
A prototype real-time intrusion-detection export system
-
New York: IEEE
-
Lunt, T. and Jagannathan. 1988. A Prototype Real-Time Intrusion-Detection Export System. Proc. IEEE Symposium on Security and Privacy, 59-66. New York: IEEE.
-
(1988)
Proc. IEEE Symposium on Security and Privacy
, pp. 59-66
-
-
Lunt, T.1
Jagannathan2
-
16
-
-
0028409472
-
Technological frames: Making sense of information technology in organizations
-
Orlikowski, W. J., & Gash, D. C. (1994). Technological frames: Making sense of information technology in organizations. ACM Transactions on Information Systems (TOIS), 12(2), 174-207.
-
(1994)
ACM Transactions on Information Systems (TOIS)
, vol.12
, Issue.2
, pp. 174-207
-
-
Orlikowski, W.J.1
Gash, D.C.2
-
17
-
-
0038037379
-
Unpacking "privacy" for a networked world
-
Ft. Lauderdale, Florida, USA, ACM Press
-
Palen, L. and P. Dourish (2003). Unpacking "privacy" for a networked world. Proceedings of the SIGCHI conference on Human factors in computing systems, Ft. Lauderdale, Florida, USA, ACM Press.
-
(2003)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
-
-
Palen, L.1
Dourish, P.2
-
19
-
-
0036005221
-
Towards a typology of internet users and online privacy concerns
-
Sheehan, K. 2002. Towards a Typology of Internet Users and Online Privacy Concerns. The Information Society, 18, 21-23.
-
(2002)
The Information Society
, vol.18
, pp. 21-23
-
-
Sheehan, K.1
-
22
-
-
0001455317
-
Designing for conversation: Lessons from cognoter
-
Tatar, D., Foster, G., and Bobrow, D. (1991). Designing for Conversation: Lessons from Cognoter. International Journal of Man-Machine Studies, 34, 185-209.
-
(1991)
International Journal of Man-machine Studies
, vol.34
, pp. 185-209
-
-
Tatar, D.1
Foster, G.2
Bobrow, D.3
|