-
2
-
-
57649195178
-
A User Study of Policy Creation in a Flexible Access-Control System
-
(Apr)
-
BAUER, L., CRANOR, L., REEDER, R. W., REITER, M. K., AND VANIEA, K. A User Study of Policy Creation in a Flexible Access-Control System. In CHI: Conference on Human Factors in Computing Systems (Apr. 2008).
-
(2008)
CHI: Conference on Human Factors in Computing Systems
-
-
BAUER, L.1
CRANOR, L.2
REEDER, R. W.3
REITER, M. K.4
VANIEA, K.5
-
3
-
-
33751080819
-
Device-Enabled Authorization in the Grey System
-
(Sept)
-
BAUER, L., GARRISS, S., MCCUNE, J. M., REITER, M. K., ROUSE, J., AND RUTENBAR, P. Device-Enabled Authorization in the Grey System. In Information Security: ISC (Sept. 2005).
-
(2005)
Information Security: ISC
-
-
BAUER, L.1
GARRISS, S.2
MCCUNE, J. M.3
REITER, M. K.4
ROUSE, J.5
RUTENBAR, P.6
-
4
-
-
0035476075
-
Making Home Automation Communications Secure
-
BERGSTROM, P., DRISCOLL, K., AND KIMBALL, J. Making Home Automation Communications Secure. Computer 34, 10 (2001), 50-56.
-
(2001)
Computer
, vol.34
, Issue.10
, pp. 50-56
-
-
BERGSTROM, P.1
DRISCOLL, K.2
KIMBALL, J.3
-
6
-
-
42549104363
-
Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments
-
BRUSH, A. J. B., AND INKPEN, K. M. Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments. In Proceedings of Ubicomp (2007).
-
(2007)
Proceedings of Ubicomp
-
-
BRUSH, A. J. B.1
INKPEN, K. M.2
-
9
-
-
85091909148
-
-
Usable Access Control inside Home Networks
-
KOSTIAINEN, K., RANTAPUSKA, O., MOLONEY, S., ROTO, V., HOLMSTROM, U., AND KARVONEN, K. Usable Access Control inside Home Networks. Nokia Research Center Technical Report NRC-TR-2007-009 (2007).
-
(2007)
Nokia Research Center Technical Report NRC-TR-2007-009
-
-
KOSTIAINEN, K.1
RANTAPUSKA, O.2
MOLONEY, S.3
ROTO, V.4
HOLMSTROM, U.5
KARVONEN, K.6
-
10
-
-
2442593213
-
Towards Security Auto-Configuration for Smart Appliances
-
MARC SEIGNEUR, J., JENSEN, C. D., FARRELL, S., GRAY, E., AND CHEN, Y. Towards Security Auto-Configuration for Smart Appliances. In Proceedings of the Smart Objects Conference (2003).
-
(2003)
Proceedings of the Smart Objects Conference
-
-
MARC SEIGNEUR, J.1
JENSEN, C. D.2
FARRELL, S.3
GRAY, E.4
CHEN, Y.5
-
11
-
-
34547662160
-
Middleware for secure home access and control
-
MARIN, A., MUELLER, W., SCHAEFER, R., ALMENAREZ, F., DIAZ, D., AND ZIEGLER, M. Middleware for secure home access and control. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (2007).
-
(2007)
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops
-
-
MARIN, A.1
MUELLER, W.2
SCHAEFER, R.3
ALMENAREZ, F.4
DIAZ, D.5
ZIEGLER, M.6
-
12
-
-
84866760170
-
Access Control for Home Data Sharing: Attitudes, Needs and Practices
-
MAZUREK, M. L., ARSENAULT, J., BREESE, J., GUPTA, N., ION, I., JOHNS, C., LEE, D., LIANG, Y., OLSEN, J., SALMON, B., SHAY, R., VANIEA, K., BAUER, L., CRANOR, L. F., GANGER, G. R., AND REITER, M. K. Access Control for Home Data Sharing: Attitudes, Needs and Practices. In CHI: Conference on Human Factors in Computing Systems (2010).
-
(2010)
CHI: Conference on Human Factors in Computing Systems
-
-
MAZUREK, M. L.1
ARSENAULT, J.2
BREESE, J.3
GUPTA, N.4
ION, I.5
JOHNS, C.6
LEE, D.7
LIANG, Y.8
OLSEN, J.9
SALMON, B.10
SHAY, R.11
VANIEA, K.12
BAUER, L.13
CRANOR, L. F.14
GANGER, G. R.15
REITER, M. K.16
-
13
-
-
56449119921
-
Expandable Grids for Visualizing and Authoring Computer Security Policies
-
REEDER, R. W., BAUER, L., CRANOR, L. F., REITER, M. K., BACON, K., HOW, K., AND STRONG, H. Expandable Grids for Visualizing and Authoring Computer Security Policies. In CHI: Proceeding of the Conference on Human Factors in Computing Systems (2008).
-
(2008)
CHI: Proceeding of the Conference on Human Factors in Computing Systems
-
-
REEDER, R. W.1
BAUER, L.2
CRANOR, L. F.3
REITER, M. K.4
BACON, K.5
HOW, K.6
STRONG, H.7
-
14
-
-
84926351578
-
Crying Wolf: An Empirical Study of SSL Warning Effectiveness
-
SUNSHINE, J., EGELMAN, S., ALMUHIMEDI, H., ATRI, N., AND CRANOR, L. F. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In USENIX Security (2009).
-
(2009)
USENIX Security
-
-
SUNSHINE, J.1
EGELMAN, S.2
ALMUHIMEDI, H.3
ATRI, N.4
CRANOR, L. F.5
-
15
-
-
0001853125
-
The Computer for the Twenty-First Century
-
(Sept)
-
WEISER, M. The Computer for the Twenty-First Century. Scientific American 265, 3 (Sept. 1991).
-
(1991)
Scientific American
, vol.265
, pp. 3
-
-
WEISER, M.1
|