Building a secure computer system
Building a secure computer system
Contextual design: an emergent view of system design
CHI '90 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Understanding DCE
Access control for collaborative environments
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Communications of the ACM
New uses and abuses of interaction hhistory: help form the research agenda
CHI '94 Conference Companion on Human Factors in Computing Systems
Networking for collaboration: video telephony and media conferencing
CHI '94 Conference Companion on Human Factors in Computing Systems
Controversies about privacy and open information in CSCW
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Usability Engineering
PGP: Pretty Good Privacy
Human Factor: Designing Computer Systems for People
Human Factor: Designing Computer Systems for People
Specifying security for CSCW systems
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A role-based access control model for protection domain derivation and management
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Tolerating penetrations and insider attacks by requiring independent corroboration
Proceedings of the 1998 workshop on New security paradigms
Napoleon: network application policy environment
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Access control in configurable systems
Secure Internet programming
Users' conceptions of web security: a comparative study
CHI '02 Extended Abstracts on Human Factors in Computing Systems
Pretty good persuasion: a first step towards effective password security in the real world
Proceedings of the 2001 workshop on New security paradigms
Integrating Security and Real-Time Requirements Using Covert Channel Capacity
IEEE Transactions on Knowledge and Data Engineering
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
Real-Time Databases and Data Services
Real-Time Systems
KNOW Why your access was denied: regulating feedback for usable security
Proceedings of the 11th ACM conference on Computer and communications security
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Two experiences designing for effective security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Improving user-interface dependability through mitigation of human error
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Mechanisms for increasing the usability of grid security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
The trouble with login: on usability and computer security in ubiquitous computing
Personal and Ubiquitous Computing
User experiences with sharing and access control
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Aligning usability and security: a usability study of Polaris
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Intentional access management: making access control usable for end-users
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Chatting with teenagers: Considering the place of chat technologies in teen life
ACM Transactions on Computer-Human Interaction (TOCHI)
Usability evaluation of multi-modal biometric verification systems
Interacting with Computers
The flask security architecture: system support for diverse security policies
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
A user's and programmer's view of the new JavaScript security model
USITS'99 Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2
E-Prime for security: a new security paradigm
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Towards understanding IT security professionals and their tools
Proceedings of the 3rd symposium on Usable privacy and security
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Communications of the ACM - The psychology of security: why do good users make bad decisions?
Family accounts: a new paradigm for user accounts within the home environment
Proceedings of the 2008 ACM conference on Computer supported cooperative work
International Journal of Human-Computer Studies
Proceedings of the 5th Symposium on Usable Privacy and Security
The compliance budget: managing security behaviour in organisations
Proceedings of the 2008 workshop on New security paradigms
Security and usability: the gap in real-world online banking
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Enhancing research into usable privacy and security
Proceedings of the 27th ACM international conference on Design of communication
Laissez-faire file sharing: access control designed for individuals at the endpoints
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
So long, and no thanks for the externalities: the rational rejection of security advice by users
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Where do security policies come from?
Proceedings of the Sixth Symposium on Usable Privacy and Security
Cue: a framework for generating meaningful feedback in XACML
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
Proceedings of the 2010 workshop on New security paradigms
More than skin deep: measuring effects of the underlying model on access-control system usability
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 2011 workshop on New security paradigms workshop
Bringing the user back into control: a new paradigm for usability in highly dynamic systems
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Eighty something: banking for the older old
BCS-HCI '11 Proceedings of the 25th BCS Conference on Human-Computer Interaction
On automated image choice for secure and usable graphical passwords
Proceedings of the 28th Annual Computer Security Applications Conference
International Journal of Information Security and Privacy
Hi-index | 0.00 |