-
1
-
-
78751528689
-
-
ActivIdentity Corp.
-
ActivIdentity Corp. Actividentity securelogin. http://www.protocom.com/, 2009.
-
(2009)
Actividentity Securelogin
-
-
-
2
-
-
0043232732
-
Users are not the enemy
-
A. Adams and M. A. Sasse. Users are not the enemy. Commun. ACM, 42(12):40-46, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
4
-
-
78650115461
-
-
January
-
AOL LLC. AOL Open Authentication API. http://dev.aol.com/api/openauth, January 2008.
-
(2008)
AOL Open Authentication API
-
-
-
5
-
-
77951004944
-
Secure delegation for web 2.0 and mashups
-
P. Austel, S. Bhola, S. Chari, L. Koved, M. McIntosh, M. Steiner, and S. Weber. Secure delegation for web 2.0 and mashups. In Workshop on Web 2.0 Security And Privacy, 2008.
-
Workshop on Web 2.0 Security and Privacy, 2008
-
-
Austel, P.1
Bhola, S.2
Chari, S.3
Koved, L.4
McIntosh, M.5
Steiner, M.6
Weber, S.7
-
9
-
-
84886762747
-
Poll: Privacy rights under attack
-
October
-
CBS News. Poll: Privacy rights under attack. http://www.cbsnews.com/ stories/2005/09/30/opinion/polls/main894733.shtml, October 2005.
-
(2005)
CBS News
-
-
-
10
-
-
80052801173
-
A usability study and critique of two password managers
-
Vancouver, Canada, August 2-4
-
S. Chiasson, P. C. van Oorschot, and R. Biddle. A usability study and critique of two password managers. In Proceedings of 15th USENIX UNIX Security Symposium, pages 1-16, Vancouver, Canada, August 2-4 2006. USENIX.
-
(2006)
Proceedings of 15th USENIX UNIX Security Symposium
, pp. 1-16
-
-
Chiasson, S.1
Van Oorschot, P.C.2
Biddle, R.3
-
11
-
-
0242456748
-
Models for coalition-based access control (CBAC)
-
Monterey, California, USA
-
E. Cohen, R. K. Thomas, W. Winsborough, and D. Shands. Models for coalition-based access control (CBAC). In Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pages 97-106, Monterey, California, USA, 2002.
-
(2002)
Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies
, pp. 97-106
-
-
Cohen, E.1
Thomas, R.K.2
Winsborough, W.3
Shands, D.4
-
12
-
-
78751504365
-
-
CoreStreet Ltd.
-
CoreStreet Ltd. Spoofstick. http://www.spoofstick.com/, 2005.
-
(2005)
Spoofstick
-
-
-
13
-
-
41949139623
-
The seven flaws of identity management: Usability and security challenges
-
R. Dhamija and L. Dusseault. The seven flaws of identity management: Usability and security challenges. IEEE Security and Privacy, 6:24-29, 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, pp. 24-29
-
-
Dhamija, R.1
Dusseault, L.2
-
14
-
-
77953804362
-
The battle against phishing: Dynamic security skins
-
New York, NY, USA, ACM
-
R. Dhamija and J. D. Tygar. The battle against phishing: Dynamic security skins. In SOUPS '05: Proceedings of the 2005 Symposium on Usable Privacy and Security, pages 77-88, New York, NY, USA, 2005. ACM.
-
(2005)
SOUPS '05: Proceedings of the 2005 Symposium on Usable Privacy and Security
, pp. 77-88
-
-
Dhamija, R.1
Tygar, J.D.2
-
15
-
-
33745816410
-
Why phishing works
-
Montréal, Québec, Canada, ACM
-
R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 581-590, Montréal, Québec, Canada, 2006. ACM.
-
(2006)
CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
17
-
-
78751541444
-
-
I. Facebook. Facebook Platform. http://www.facebook.com/platform, 2010.
-
(2010)
Facebook Platform
-
-
-
18
-
-
78449292123
-
-
October
-
I. Facebook. Facebook Press Room Statistics. http://www.facebook.com/ press/info.php?statistics, October 2010.
-
(2010)
Facebook Press Room Statistics
-
-
-
19
-
-
35348884906
-
A large-scale study of web password habits
-
New York, NY, USA, ACM
-
D. Florencio and C. Herley. A large-scale study of web password habits. In WWW '07: Proceedings of the 16th International Conference on World Wide Web, pages 657-666, New York, NY, USA, 2007. ACM.
-
(2007)
WWW '07: Proceedings of the 16th International Conference on World Wide Web
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
23
-
-
77953767524
-
Stopping spyware at the gate: A user study of privacy, notice and spyware
-
New York, NY, USA, ACM
-
N. Good, R. Dhamija, J. Grossklags, D. Thaw, S. Aronowitz, D. Mulligan, and J. Konstan. Stopping spyware at the gate: a user study of privacy, notice and spyware. In SOUPS '05: Proceedings of the 2005 Symposium on Usable Privacy and Security, pages 43-52, New York, NY, USA, 2005. ACM.
-
(2005)
SOUPS '05: Proceedings of the 2005 Symposium on Usable Privacy and Security
, pp. 43-52
-
-
Good, N.1
Dhamija, R.2
Grossklags, J.3
Thaw, D.4
Aronowitz, S.5
Mulligan, D.6
Konstan, J.7
-
26
-
-
33745886578
-
A convenient method for securely managing passwords
-
J. A. Halderman, B. Waters, and E. W. Felten. A convenient method for securely managing passwords. In Proc. of WWW 2005, pages 471-479, 2005.
-
(2005)
Proc. of WWW 2005
, pp. 471-479
-
-
Halderman, J.A.1
Waters, B.2
Felten, E.W.3
-
28
-
-
78751507941
-
Attacking Certificate-based Authentication System and Microsoft InfoCard
-
X. Hao. Attacking Certificate-based Authentication System and Microsoft InfoCard. In Power of Community Security Conference, 2009.
-
Power of Community Security Conference, 2009
-
-
Hao, X.1
-
29
-
-
77950877250
-
So long, and no thanks for the externalities: The rational rejection of security advice by users
-
New York, NY, USA, ACM
-
C. Herley. So long, and no thanks for the externalities: the rational rejection of security advice by users. In NSPW '09: Proceedings of the 2009 Workshop on New Security Paradigms Workshop, pages 133-144, New York, NY, USA, 2009. ACM.
-
(2009)
NSPW '09: Proceedings of the 2009 Workshop on New Security Paradigms Workshop
, pp. 133-144
-
-
Herley, C.1
-
30
-
-
54049142548
-
Security and identification indicators for browsers against spoofing and phishing attacks
-
A. Herzberg and A. Jbara. Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Internet Technology, 8(4):1-36, 2008.
-
(2008)
ACM Trans. Internet Technology
, vol.8
, Issue.4
, pp. 1-36
-
-
Herzberg, A.1
Jbara, A.2
-
32
-
-
76549094940
-
-
Internet2. Shibboleth System. http://shibboleth.internet2.edu/, 2008.
-
(2008)
Shibboleth System
-
-
-
33
-
-
78751508490
-
-
JanRain Inc. Relying Party Stats. http://www.janrain.com/blogs/relying- party-stats-april-1st-2009, 2009.
-
(2009)
Relying Party Stats
-
-
-
35
-
-
80052788393
-
Usability and privacy in identity management architectures
-
Darlinghurst, Australia, Australia, Australian Computer Society, Inc.
-
A. Jøsang, M. A. Zomai, and S. Suriadi. Usability and privacy in identity management architectures. In ACSW '07: Proceedings of the Fifth Australasian Symposium on ACSW Frontiers, pages 143-152, Darlinghurst, Australia, Australia, 2007. Australian Computer Society, Inc.
-
(2007)
ACSW '07: Proceedings of the Fifth Australasian Symposium on ACSW Frontiers
, pp. 143-152
-
-
Jøsang, A.1
Zomai, M.A.2
Suriadi, S.3
-
37
-
-
78751479784
-
-
Liberty Alliance
-
Liberty Alliance. Liberty Alliance Project. http://www.projectliberty. org/, 2002.
-
(2002)
-
-
-
38
-
-
41949086982
-
The venn of identity: Options and issues in federated identity management
-
E. Maler and D. Reed. The venn of identity: Options and issues in federated identity management. IEEE Security and Privacy, 6:16-23, 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, pp. 16-23
-
-
Maler, E.1
Reed, D.2
-
41
-
-
78751541943
-
-
Microsoft Corp. Windows CardSpace. http://www.microsoft.com/windows/ products/winfamily/cardspace/default.mspx, 2009.
-
(2009)
Windows CardSpace
-
-
-
43
-
-
78751551107
-
-
Mozila Labs. Weave Identity Account Manager. https://wiki.mozilla.org/ Labs/Weave/Identity/Account-Manager, 2009.
-
(2009)
Weave Identity Account Manager
-
-
-
44
-
-
85011548130
-
Desktop security and usability trade-offs: An evaluation of password management systems
-
J. Mulligan and A. Elbirt. Desktop security and usability trade-offs: An evaluation of password management systems. Information Systems Security, 14(2):10-19, 2005.
-
(2005)
Information Systems Security
, vol.14
, Issue.2
, pp. 10-19
-
-
Mulligan, J.1
Elbirt, A.2
-
46
-
-
78650093214
-
-
MyOpenID
-
MyOpenID. OpenID Site Directory. http://openiddirectory.com/, 2010.
-
(2010)
OpenID Site Directory
-
-
-
48
-
-
78751478749
-
-
Netcraft. August 2010 Web Server Survey. http://news.netcraft.com/ archives/category/web-server-survey/, 2010.
-
(2010)
August 2010 Web Server Survey
-
-
-
49
-
-
78751493630
-
-
Novell Inc. Novell securelogin. http://www.novell.com/products/ securelogin/, 2009.
-
(2009)
Novell Securelogin
-
-
-
51
-
-
78650106538
-
-
December
-
OAuth Core Workgroup. Oauth core 1.0 specification. http://oauth.net/ core/1.0/, December 2007.
-
(2007)
Oauth Core 1.0 Specification
-
-
-
52
-
-
78751493629
-
-
March
-
Open Identity Exchange. Building trust online identity. http://openidentityexchange.org/, March 2010.
-
(2010)
Building Trust Online Identity
-
-
-
54
-
-
78751528688
-
-
OpenID Foundation. OpenID Directory. http://openiddirectory.com/, 2010.
-
(2010)
OpenID Directory
-
-
-
55
-
-
78650083058
-
-
April
-
OpenID Wiki. Openid user experience. http://wiki.openid.net/browse/view= ViewFolder¶m=user-experience, April 2010.
-
(2010)
Openid User Experience
-
-
-
56
-
-
1642359636
-
Microsoft.NET Passport and identity management
-
R. Oppliger. Microsoft .NET Passport and identity management. Information Security Technical Report, 9(1):26-34, 2004.
-
(2004)
Information Security Technical Report
, vol.9
, Issue.1
, pp. 26-34
-
-
Oppliger, R.1
-
60
-
-
34548786769
-
The emperor's new security indicators
-
Washington, DC, USA, IEEE Computer Society
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 51-65, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
63
-
-
77950836598
-
Secure Web 2.0 content sharing beyond walled gardens
-
ACSA, IEEE Press, December 7-11
-
S.-T. Sun, K. Hawkey, and K. Beznosov. Secure Web 2.0 content sharing beyond walled gardens. In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), pages 409-418. ACSA, IEEE Press, December 7-11 2009.
-
(2009)
Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC)
, pp. 409-418
-
-
Sun, S.-T.1
Hawkey, K.2
Beznosov, K.3
-
64
-
-
84926351578
-
Crying Wolf: An empirical study of SSL warning effectiveness
-
J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An empirical study of SSL warning effectiveness. In Proceedings of 18th USENIX Security Symposium, pages 399-432, 2009.
-
(2009)
Proceedings of 18th USENIX Security Symposium
, pp. 399-432
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
66
-
-
78751482334
-
-
The Eclipse Foundation. Higgins Card Selectors. http://www.eclipse.org/ higgins/, 2009.
-
(2009)
Higgins Card Selectors
-
-
-
71
-
-
78650131006
-
-
Wikipedia. Password fatigue. http://en.wikipedia.org/wiki/Password- fatigue, 2009.
-
(2009)
Password Fatigue
-
-
-
72
-
-
44349146652
-
Purpose and scope of warnings
-
Lawrence Erlbaum Associates
-
M. Wogalter. Purpose and scope of warnings. In Handbook of Warnings, pages 3-9. Lawrence Erlbaum Associates, 2006.
-
(2006)
Handbook of Warnings
, pp. 3-9
-
-
Wogalter, M.1
-
74
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
New York, NY, USA, ACM
-
M. Wu, R. C. Miller, and S. L. Garfinkel. Do security toolbars actually prevent phishing attacks? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI '06), pages 601-610, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI '06)
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
75
-
-
34250786200
-
Web wallet: Preventing phishing attacks by revealing user intentions
-
New York, NY, USA, ACM
-
M. Wu, R. C. Miller, and G. Little. Web wallet: preventing phishing attacks by revealing user intentions. In SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security, pages 102-113, New York, NY, USA, 2006. ACM.
-
(2006)
SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security
, pp. 102-113
-
-
Wu, M.1
Miller, R.C.2
Little, G.3
-
78
-
-
34250747969
-
Passpet: Convenient password management and phishing protection
-
New York, NY, USA, ACM
-
K.-P. Yee and K. Sitaker. Passpet: convenient password management and phishing protection. In SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security, pages 32-43, New York, NY, USA, 2006. ACM.
-
(2006)
SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security
, pp. 32-43
-
-
Yee, K.-P.1
Sitaker, K.2
|