-
1
-
-
22144439749
-
R-what?' Development of a role-based access control policy-writing tool for escientists
-
Brostoff, S., Sasse, M. A., Chadwick, D., Cunningham, J., Mbanaso, U., and Otenko, S. (2005). 'R-What?' Development of a role-based access control policy-writing tool for escientists. Software-Practice and Experience, 35:835-856.
-
(2005)
Software-practice and Experience, 35:835-856
-
-
Brostoff, S.1
Sasse, M.A.2
Chadwick, D.3
Cunningham, J.4
Mbanaso, U.5
Otenko, S.6
-
2
-
-
84944048132
-
The Ponder policy specification language
-
Springer-Verlag
-
Damianou, N., Dulay, N., Lupu, E., and Sloman, M. (2001). The Ponder policy specification language. In Proceedings of the International Workshop on Policies for Distributed Systems and Networks (Policy'01), volume LNCS 1995, pages 18-38. Springer-Verlag.
-
(2001)
Proceedings of the International Workshop on Policies for Distributed Systems and Networks (Policy'01)
, vol.LNCS1995
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
5
-
-
33646679400
-
To download or not to download: An examination of computer security decision making
-
Hardee, J. B., West, R., and Mayhorn, C. B. (2006). To download or not to download: an examination of computer security decision making. interactions, 13(3):32-37.
-
(2006)
Interactions
, vol.13
, Issue.3
, pp. 32-37
-
-
Hardee, J.B.1
West, R.2
Mayhorn, C.B.3
-
9
-
-
18844394496
-
Performance of the Java security manager
-
Herzog, A. and Shahmehri, N. (2005). Performance of the Java security manager. Computers & Security, 24(3):192-207.
-
(2005)
Computers & Security
, vol.24
, Issue.3
, pp. 192-207
-
-
Herzog, A.1
Shahmehri, N.2
-
10
-
-
33845528583
-
A usability study of security policy managment
-
Fischer-Hübner, S., Rannenberg, K., and Louise Yngström, S. L., editors, Springer-Verlag
-
st International Information Security Conference (IFIP TC-11) (SEC'06), pages 296-306. Springer-Verlag.
-
(2006)
st International Information Security Conference (IFIP TC-11) (SEC'06)
, pp. 296-306
-
-
Herzog, A.1
Shahmehri, N.2
-
12
-
-
0347025921
-
Security and human computer interfaces
-
Johnston, J., Eloff, J. H. P., and Labuschagne, L. (2003). Security and human computer interfaces. Computers & Security, 22(8):675-684.
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 675-684
-
-
Johnston, J.1
Eloff, J.H.P.2
Labuschagne, L.3
-
13
-
-
0242276201
-
A policy based approach to security for the semantic web
-
Springer-Verlag
-
Kagal, L., Finin, T., and Joshi, A. (2003). A policy based approach to security for the semantic web. In Proceedings of the International Semantic Web Conference (ISWC'03), volume LNCS2870, pages 402-418. Springer-Verlag.
-
(2003)
Proceedings of the International Semantic Web Conference (ISWC'03)
, vol.LNCS2870
, pp. 402-418
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
16
-
-
0001775576
-
Heuristic evaluation
-
Nielsen, J. and Mack, R. L., editors 1994, Wiley & Sons
-
Nielsen, J. (1994). Heuristic evaluation. In Nielsen, J. and Mack, R. L., editors (1994). Usability Inspection Methods. Wiley & Sons, pages 25-62.
-
(1994)
Usability Inspection Methods
, pp. 25-62
-
-
Nielsen, J.1
-
18
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J. H. and Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
19
-
-
0035387175
-
Transforming the weakest link-a human/computer interaction approach to usable and effective security
-
Sasse, M. A., Brostoff, S., and Weirich, D. (2003). Transforming the weakest link-a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3):122-131.
-
(2003)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
20
-
-
84893105662
-
Requirements for policy languages for trust negotiation
-
IEEE
-
rd International Workshop on Policies for Distributed Systems and Networks (Policy'02), pages 68-79. IEEE.
-
(2002)
rd International Workshop on Policies for Distributed Systems and Networks (Policy'02)
, pp. 68-79
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobson, J.6
Mills, H.7
Yu, L.8
-
22
-
-
0242283462
-
-
Morgan Kaufmann Publishers
-
Snyder, C. (2003). Paper Prototyping. Morgan Kaufmann Publishers.
-
(2003)
Paper Prototyping
-
-
Snyder, C.1
-
23
-
-
19944372231
-
-
PhD thesis, School of Computer Science, Carnegie Mellon University. CMU-CS-04-135
-
Whitten, A. (2004). Making Security Usable. PhD thesis, School of Computer Science, Carnegie Mellon University. CMU-CS-04-135.
-
(2004)
Making Security Usable
-
-
Whitten, A.1
-
25
-
-
84939548725
-
Automated trust negotiation
-
IEEE
-
Winsborough, W. H., Seamons, K. E., and Jones, V. E. (2000). Automated trust negotiation. In Proceedings of the DARPA Information Survivability Conference & Exposition (DISCEX'00), vol. 1, pages 88-102. IEEE.
-
(2000)
Proceedings of the DARPA Information Survivability Conference & Exposition (DISCEX'00)
, vol.1
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
27
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
IEEE
-
Zurko, M. E., Simon, R., and Sanfilippo, T. (1999). A user-centered, modular authorization service built on an RBAC foundation. In Proceedings of the IEEE Symposium on Security and Privacy, pages 57-71. IEEE.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.E.1
Simon, R.2
Sanfilippo, T.3
|