메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Do Windows users follow the principle of least privilege? Investigating user account control practices

Author keywords

Least privilege principle; Least privilege user account; Usable security; User account control

Indexed keywords

DUE DILIGENCE; KNOWLEDGE AND EXPERIENCE; LEAST PRIVILEGE; PRACTICAL IMPLEMENTATION; SECURITY INCIDENT; USABLE SECURITY; USER ACCOUNT CONTROL; USER STUDY; WINDOWS VISTA;

EID: 77956256786     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1837110.1837112     Document Type: Conference Paper
Times cited : (7)

References (28)
  • 6
    • 29744452822 scopus 로고    scopus 로고
    • Java web start: Developing and distributing java applications for the client side
    • IBM Corp. Armonk, NY, September
    • S. Kim. Java web start: Developing and distributing Java applications for the client side. White paper, IBM Corp. Armonk, NY, September 2001. http://www.ibm.com/developerworks/java/library/j-webstart.
    • (2001) White Paper
    • Kim, S.1
  • 8
    • 0007757040 scopus 로고
    • Methodology matters: Doing research in the behavioral and social sciences
    • Morgan Kaufmann Publishers Inc
    • J. E. McGrath. Methodology matters: doing research in the behavioral and social sciences. Human-computer interaction: toward the year 2000, pages 152-169, 1995. Morgan Kaufmann Publishers Inc.
    • (1995) Human-Computer Interaction: Toward the Year 2000 , pp. 152-169
    • McGrath, J.E.1
  • 13
    • 77956256320 scopus 로고    scopus 로고
    • February
    • Rootsudo. Ubuntu Documentation, https://help.ubuntu.com/community/ RootSudo, February 2010.
    • (2010) Rootsudo
  • 14
    • 77956259978 scopus 로고    scopus 로고
    • August
    • C. A. Rusen. Windows 7 vs Windows Vista: the UAC Benchmark. http://www.7tutorials.com/windows-7-vs-windows-vista-uac-benchmark, August 2009.
    • (2009)
    • Rusen, C.A.1
  • 16
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept.
    • J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sept. 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 18
    • 11144338913 scopus 로고
    • Intended and unintended consequences of warning messages: A review and synthesis of empirical research
    • D. W. Stewart and I. M. Martin. Intended and unintended consequences of warning messages: A review and synthesis of empirical research. Journal of Public Policy and Marketing, 13(1):1-19, 1994.
    • (1994) Journal of Public Policy and Marketing , vol.13 , Issue.1 , pp. 1-19
    • Stewart, D.W.1    Martin, I.M.2
  • 24
    • 77956232744 scopus 로고    scopus 로고
    • June
    • What's new in user account control. TechNet Library, http://technet. microsoft.com/en-us/library/dd446675(WS.10).aspx, June 2009.
    • (2009) What's New in User Account Control
  • 26
    • 44349194326 scopus 로고    scopus 로고
    • Communication-human information processing (C-HIP) model
    • Lawrence Erlbaum Associates
    • M. Wogalter. Communication-Human Information Processing (C-HIP) Model. In Handbook of Warnings, pages 51-61. Lawrence Erlbaum Associates, 2006.
    • (2006) Handbook of Warnings , pp. 51-61
    • Wogalter, M.1
  • 27
    • 44349146652 scopus 로고    scopus 로고
    • Purpose and scope of warnings
    • Lawrence Erlbaum Associates
    • M. Wogalter. Purpose and scope of warnings. In Handbook of Warnings, pages 3-9. Lawrence Erlbaum Associates, 2006.
    • (2006) Handbook of Warnings , pp. 3-9
    • Wogalter, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.