User Interaction Design for Secure Systems
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Privacy in e-commerce: stated preferences vs. actual behavior
Communications of the ACM - Transforming China
PeCAN: an architecture for users' privacy-aware electronic commerce contexts on the semantic web
Information Systems - Special issue: The semantic web and web services
Identities Management for E-Commerce and Collaboration Applications
International Journal of Electronic Commerce
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Mobile Identity Management Revisited
Electronic Notes in Theoretical Computer Science (ENTCS)
User agents in E-commerce environments: industry vs. consumer perspectives on data exchange
CAiSE'03 Proceedings of the 15th international conference on Advanced information systems engineering
A taxonomy of single sign-on systems
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Towards inclusive identity management
Identity in the Information Society
FLASCHE – a mechanism providing anonymity for mobile users
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Privacy for profitable location based services
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Context management for m-commerce applications: determinants, methodology and the role of marketing
Information Technology and Management
Hi-index | 0.00 |
In today's applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security functions correctly. In this paper, we present a new concept to improve the usability of security mechanisms, introducing an extended classification of protection goals. As a result, the everyday use of security functionality can be reduced to selecting the user's identity, which is the basis of the Identity-Manager, a new security tool presented in this paper. It offers a user interface for security functionality that is compatible with all Internet applications, so even inexperienced users are able to configure and negotiate their security needs in a convenient way.