-
2
-
-
57649195178
-
A user study of policy creation in a flexible access-control system
-
April
-
L. Bauer, L. F. Cranor, R. W. Reeder, M. K. Reiter, and K. Vaniea. A user study of policy creation in a flexible access-control system. ACM SIGCHI Conference on Human Factors in Computing Systems, pages 543-552, April 2008.
-
(2008)
ACM SIGCHI Conference on Human Factors in Computing Systems
, pp. 543-552
-
-
Bauer, L.1
Cranor, L.F.2
Reeder, R.W.3
Reiter, M.K.4
Vaniea, K.5
-
3
-
-
22144439749
-
'R-What?' Development of a role-based access control policy-writing tool for e-Scientists
-
DOI 10.1002/spe.691
-
S. Brostoff, M. A. Sasse, D. Chadwick, J. Cunningham, U. Mbanaso, and S. Otenko. 'R-What?' Development of a role-based access control policy-writing tool for e-Scientists. Software Practice & Experience, 35(9):835-856, June 2005. (Pubitemid 40972075)
-
(2005)
Software - Practice and Experience
, vol.35
, Issue.9
, pp. 835-856
-
-
Brostoff, S.1
Sasse, M.A.2
Chadwick, D.3
Cunningham, J.4
Mbanaso, U.5
Otenko, S.6
-
4
-
-
34250753855
-
Intentional access management: Making access control usable for end-users
-
DOI 10.1145/1143120.1143124, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
-
X. Cao and L. Iverson. Intentional access management: Making access control usable for end-users. 2nd Symposium on Usable Privacy and Security, pages 20-31, 2006. (Pubitemid 46966966)
-
(2006)
ACM International Conference Proceeding Series
, vol.149
, pp. 20-31
-
-
Xiang, C.1
Iverson, L.2
-
5
-
-
33749558954
-
Specifying and reasoning about dynamic access-control policies
-
4130 LNAI, Automated Reasoning - Third International Joint Conference, IJCAR 2006, Proceedings
-
D. J. Dougherty, K. Fisler, and S. Krishnamurthi. Specifying and reasoning about dynamic access-control policies. 3rd International Joint Conference on Automated Reasoning, Lecture Notes in Computer Science, Vol. 4130, pages 632-646, August 2006. (Pubitemid 44532706)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 632-646
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
10
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. 1997 ACM SIGMOD International Conference on Management of Data, pages 474-485, 1997. (Pubitemid 127456808)
-
(1997)
SIGMOD Record (ACM Special Interest Group on Management of Data)
, vol.26
, Issue.2
, pp. 474-485
-
-
Jajodia, S.1
Subrahmanian, V.S.2
Samarati, P.3
Bertino, E.4
-
11
-
-
77950888157
-
Laissez-faire file sharing: Access control designed for individuals at the endpoints
-
M. Johnson, S. M. Bellovin, R. W. Reeder, and S. E. Schechter. Laissez-faire file sharing: Access control designed for individuals at the endpoints. 2009 New Security Paradigms Workshop, pages 1-10, 2009.
-
(2009)
2009 New Security Paradigms Workshop
, pp. 1-10
-
-
Johnson, M.1
Bellovin, S.M.2
Reeder, R.W.3
Schechter, S.E.4
-
13
-
-
34547240740
-
Usability design and evaluation for privacy and security solutions
-
L. F. Cranor and S. Garfinkel, editors chapter 4 O'Reilly, Sebastopol, CA
-
C.-M. Karat, C. Brodie, and J. Karat. Usability design and evaluation for privacy and security solutions. In L. F. Cranor and S. Garfinkel, editors, Security and Usability, chapter 4, pages 47-74. O'Reilly, Sebastopol, CA, 2005.
-
(2005)
Security and Usability
, pp. 47-74
-
-
Karat, C.-M.1
Brodie, C.2
Karat, J.3
-
14
-
-
33745812093
-
Evaluating interfaces for privacy policy rule authoring
-
CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI
-
C.-M. Karat, J. Karat, C. Brodie, and J. Feng. Evaluating interfaces for privacy policy rule authoring. ACM SIGCHI Conference on Human Factors in Computing Systems, pages 83-92, 2006. (Pubitemid 44032090)
-
(2006)
Conference on Human Factors in Computing Systems - Proceedings
, vol.1
, pp. 83-92
-
-
Karat, C.-M.1
Karat, J.2
Brodie, C.3
Feng, J.4
-
16
-
-
19944391032
-
Improving user-interface dependability through mitigation of human error
-
DOI 10.1016/j.ijhcs.2005.04.009, PII S1071581905000601, HCI Research in Privacy and Security
-
R. A. Maxion and R. W. Reeder. Improving user-interface dependability through mitigation of human error. International Journal of Human-Computer Studies, 63(1-2):25-50, July 2005. (Pubitemid 40753492)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 25-50
-
-
Maxion, R.A.1
Reeder, R.W.2
-
17
-
-
70349191034
-
-
PhD thesis, Computer Science Department, Carnegie Mellon University, Pittsburgh, PA, May Available as technical report number CMU-CS-08-143
-
R. W. Reeder. Expandable Grids: A user interface visualization technique and a policy semantics to support fast, accurate security and privacy policy authoring. PhD thesis, Computer Science Department, Carnegie Mellon University, Pittsburgh, PA, May 2008. Available as technical report number CMU-CS-08-143.
-
(2008)
Expandable Grids: A User Interface Visualization Technique and a Policy Semantics to Support Fast, Accurate Security and Privacy Policy Authoring
-
-
Reeder, R.W.1
-
18
-
-
56449119921
-
Expandable grids for visualizing and authoring computer security policies
-
April
-
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How, and H. Strong. Expandable grids for visualizing and authoring computer security policies. ACM SIGCHI Conference on Human Factors in Computing Systems, pages 1473-1482, April 2008.
-
(2008)
ACM SIGCHI Conference on Human Factors in Computing Systems
, pp. 1473-1482
-
-
Reeder, R.W.1
Bauer, L.2
Cranor, L.F.3
Reiter, M.K.4
Bacon, K.5
How, K.6
Strong, H.7
-
19
-
-
34250879822
-
Seeing further: Extending visualization as a basis for usable security
-
DOI 10.1145/1143120.1143138, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
-
J. Rode, C. Johansson, P. DiGioia, R. S. Filho, K. Nies, D. H. Nguyen, J. Ren, P. Dourish, and D. Redmiles. Seeing further: Extending visualization as a basis for usable security. 2nd Symp. on Usable Privacy and Security, pages 145-155, 2006. (Pubitemid 46970242)
-
(2006)
ACM International Conference Proceeding Series
, vol.149
, pp. 145-155
-
-
Rode, J.1
Johansson, C.2
DiGioia, P.3
Filho, R.S.4
Nies, K.5
Nguyen, D.H.6
Ren, J.7
Dourish, P.8
Redmiles, D.9
-
20
-
-
0020799406
-
Direct manipulation: A step beyond programming languages
-
B. Shneiderman. Direct manipulation: A step beyond programming languages. Computer, 16(8):57-69, August 1983. (Pubitemid 13590936)
-
(1983)
Computer
, vol.16
, Issue.8
, pp. 57-69
-
-
Shneiderman Ben1
-
23
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
May
-
M. E. Zurko, R. Simon, and T. Sanfilippo. A user-centered, modular authorization service built on an RBAC foundation. 1999 IEEE Symposium on Security and Privacy, pages 57-71, May 1999.
-
(1999)
1999 IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.E.1
Simon, R.2
Sanfilippo, T.3
-
24
-
-
84926001904
-
User-centered security
-
Lake Arrowhead, CA, September Available at
-
M. E. Zurko and R. T. Simon. User-centered security. Workshop on New Security Paradigms, pages 27-33, Lake Arrowhead, CA, September 1996. Available at http://www.memesoft.com/adage/.
-
(1996)
Workshop on New Security Paradigms
, pp. 27-33
-
-
Zurko, M.E.1
Simon, R.T.2
|