메뉴 건너뛰기




Volumn 2000-January, Issue , 2000, Pages 344-353

Usability meets security - The Identity-Manager as your personal security assistant for the Internet

Author keywords

Application software; Computer science; Computer security; Internet; Navigation; Protection; Psychology; Telematics; Usability; User interfaces

Indexed keywords

APPLICATION PROGRAMS; COMPUTER SCIENCE; INTERNET; MANAGERS; NAVIGATION; NETWORK SECURITY; SECURITY OF DATA; SECURITY SYSTEMS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84949501863     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2000.898889     Document Type: Conference Paper
Times cited : (54)

References (14)
  • 3
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
    • D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24, 2:84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 8
    • 0002560477 scopus 로고    scopus 로고
    • Surfing your Turf
    • April
    • M. McGinity. Surfing your Turf. Communications of the ACM, 43(4):19-21, April 2000.
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 19-21
    • McGinity, M.1
  • 11
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • September
    • J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 13
    • 0011086762 scopus 로고    scopus 로고
    • Empowering Users to Set Their Security Goals
    • G. Müller and K. Rannenberg, editors, Technology, Infrastructure, Economy, Addison Wesley Longman Verlag GmbH
    • G. Wolf and A. Pfitzmann. Empowering Users to Set Their Security Goals. In G. Müller and K. Rannenberg, editors, Technology, Infrastructure, Economy, volume 3 of Multilateral Security in Communications, pages 113-135. Addison Wesley Longman Verlag GmbH, 1999.
    • (1999) Multilateral Security in Communications , vol.3 , pp. 113-135
    • Wolf, G.1    Pfitzmann, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.