메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 406-415

Usable access control for the World Wide Web

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL SYSTEMS; SECURITY OF DATA; SECURITY SYSTEMS; WORLD WIDE WEB;

EID: 84944717964     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2003.1254345     Document Type: Conference Paper
Times cited : (18)

References (14)
  • 2
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise computer computer security mechanisms and how to take remedial measures
    • December
    • A. Adams and M. A. Sasse. Users are not the enemy: Why users compromise computer computer security mechanisms and how to take remedial measures. Communications of the ACM, 42:40-46, December 1999.
    • (1999) Communications of the ACM , vol.42 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 7
    • 0003286492 scopus 로고    scopus 로고
    • The TLS protocol version 1.0
    • The Internet Society, January. RFC 2246
    • T. Dierks and C. Allen. The TLS Protocol Version 1.0. IETF - Network Working Group, The Internet Society, January 1999. RFC 2246.
    • (1999) IETF - Network Working Group
    • Dierks, T.1    Allen, C.2
  • 11
    • 0003308762 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and CRL profile
    • The Internet Society, January. RFC 2459
    • R. Housley, W. Ford, W. Polk, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. IETF - Network Working Group, The Internet Society, January 1999. RFC 2459.
    • (1999) IETF - Network Working Group
    • Housley, R.1    Ford, W.2    Polk, W.3    Solo, D.4
  • 12
    • 84944771092 scopus 로고    scopus 로고
    • bridge2java
    • IBM. bridge2java. http://www.alphaworks.ibm.com/tech/bridge2java/.
    • IBM1
  • 13
    • 0038226921 scopus 로고    scopus 로고
    • Moving from the design of usable security technologies to the design of useful secure applications
    • ACM
    • D. K. Smetters and R. E. Grinter. Moving from the design of usable security technologies to the design of useful secure applications. In New Security Paradigms Workshop '02. ACM, 2002.
    • (2002) New Security Paradigms Workshop '02
    • Smetters, D.K.1    Grinter, R.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.