메뉴 건너뛰기




Volumn , Issue , 2007, Pages 99-113

Usable set-up of runtime security policies

Author keywords

Access control; Application surveillance; Java; Security policy management; Usability

Indexed keywords

ACCESS CONTROL; COMPUTATIONAL LINGUISTICS; JAVA PROGRAMMING LANGUAGE; MOBILE SECURITY; SECURITY OF DATA; SECURITY SYSTEMS; SEMANTIC WEB;

EID: 84873208320     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (27)
  • 5
    • 33646679400 scopus 로고    scopus 로고
    • To download or not to download: An examination of computer security decision making
    • Hardee, J. B., West, R., and Mayhorn, C. B. (2006). To download or not to download: an examination of computer security decision making. interactions, 13(3):32-37.
    • (2006) Interactions , vol.13 , Issue.3 , pp. 32-37
    • Hardee, J.B.1    West, R.2    Mayhorn, C.B.3
  • 8
  • 9
    • 18844394496 scopus 로고    scopus 로고
    • Performance of the Java security manager
    • Herzog, A. and Shahmehri, N. (2005). Performance of the Java security manager. Computers & Security, 24(3):192-207.
    • (2005) Computers & Security , vol.24 , Issue.3 , pp. 192-207
    • Herzog, A.1    Shahmehri, N.2
  • 16
    • 0001775576 scopus 로고
    • Heuristic evaluation
    • Nielsen, J. and Mack, R. L., editors 1994, Wiley & Sons
    • Nielsen, J. (1994). Heuristic evaluation. In Nielsen, J. and Mack, R. L., editors (1994). Usability Inspection Methods. Wiley & Sons, pages 25-62.
    • (1994) Usability Inspection Methods , pp. 25-62
    • Nielsen, J.1
  • 18
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J. H. and Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 19
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the weakest link-a human/computer interaction approach to usable and effective security
    • Sasse, M. A., Brostoff, S., and Weirich, D. (2003). Transforming the weakest link-a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3):122-131.
    • (2003) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 22
  • 23
    • 19944372231 scopus 로고    scopus 로고
    • PhD thesis, School of Computer Science, Carnegie Mellon University. CMU-CS-04-135
    • Whitten, A. (2004). Making Security Usable. PhD thesis, School of Computer Science, Carnegie Mellon University. CMU-CS-04-135.
    • (2004) Making Security Usable
    • Whitten, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.