메뉴 건너뛰기




Volumn , Issue , 2011, Pages 2065-2074

More than skin deep: Measuring effects of the underlying model on access-control system usability

Author keywords

Access control; Human factors; Security

Indexed keywords

CONTROL SYSTEMS; HUMAN ENGINEERING; SEMANTICS; USER INTERFACES; WINDOWS OPERATING SYSTEM;

EID: 79958090839     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1978942.1979243     Document Type: Conference Paper
Times cited : (21)

References (24)
  • 3
    • 22144439749 scopus 로고    scopus 로고
    • 'R-What?' Development of a role-based access control policy-writing tool for e-Scientists
    • DOI 10.1002/spe.691
    • S. Brostoff, M. A. Sasse, D. Chadwick, J. Cunningham, U. Mbanaso, and S. Otenko. 'R-What?' Development of a role-based access control policy-writing tool for e-Scientists. Software Practice & Experience, 35(9):835-856, June 2005. (Pubitemid 40972075)
    • (2005) Software - Practice and Experience , vol.35 , Issue.9 , pp. 835-856
    • Brostoff, S.1    Sasse, M.A.2    Chadwick, D.3    Cunningham, J.4    Mbanaso, U.5    Otenko, S.6
  • 4
    • 34250753855 scopus 로고    scopus 로고
    • Intentional access management: Making access control usable for end-users
    • DOI 10.1145/1143120.1143124, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
    • X. Cao and L. Iverson. Intentional access management: Making access control usable for end-users. 2nd Symposium on Usable Privacy and Security, pages 20-31, 2006. (Pubitemid 46966966)
    • (2006) ACM International Conference Proceeding Series , vol.149 , pp. 20-31
    • Xiang, C.1    Iverson, L.2
  • 13
    • 34547240740 scopus 로고    scopus 로고
    • Usability design and evaluation for privacy and security solutions
    • L. F. Cranor and S. Garfinkel, editors chapter 4 O'Reilly, Sebastopol, CA
    • C.-M. Karat, C. Brodie, and J. Karat. Usability design and evaluation for privacy and security solutions. In L. F. Cranor and S. Garfinkel, editors, Security and Usability, chapter 4, pages 47-74. O'Reilly, Sebastopol, CA, 2005.
    • (2005) Security and Usability , pp. 47-74
    • Karat, C.-M.1    Brodie, C.2    Karat, J.3
  • 16
    • 19944391032 scopus 로고    scopus 로고
    • Improving user-interface dependability through mitigation of human error
    • DOI 10.1016/j.ijhcs.2005.04.009, PII S1071581905000601, HCI Research in Privacy and Security
    • R. A. Maxion and R. W. Reeder. Improving user-interface dependability through mitigation of human error. International Journal of Human-Computer Studies, 63(1-2):25-50, July 2005. (Pubitemid 40753492)
    • (2005) International Journal of Human Computer Studies , vol.63 , Issue.1-2 , pp. 25-50
    • Maxion, R.A.1    Reeder, R.W.2
  • 20
    • 0020799406 scopus 로고
    • Direct manipulation: A step beyond programming languages
    • B. Shneiderman. Direct manipulation: A step beyond programming languages. Computer, 16(8):57-69, August 1983. (Pubitemid 13590936)
    • (1983) Computer , vol.16 , Issue.8 , pp. 57-69
    • Shneiderman Ben1
  • 24
    • 84926001904 scopus 로고    scopus 로고
    • User-centered security
    • Lake Arrowhead, CA, September Available at
    • M. E. Zurko and R. T. Simon. User-centered security. Workshop on New Security Paradigms, pages 27-33, Lake Arrowhead, CA, September 1996. Available at http://www.memesoft.com/adage/.
    • (1996) Workshop on New Security Paradigms , pp. 27-33
    • Zurko, M.E.1    Simon, R.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.