IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Access control for collaborative environments
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Awareness and coordination in shared workspaces
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Real time groupware as a distributed system: concurrency control and its effect on the interface
CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
Automatic monitoring of software requirements
ICSE '97 Proceedings of the 19th international conference on Software engineering
Pulsar: an extensible tool for monitoring large Unix sites
Software—Practice & Experience
Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP)
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Flexible meta access-control for collaborative applications
CSCW '98 Proceedings of the 1998 ACM conference on Computer supported cooperative work
An approach to large-scale collection of application usage data over the Internet
Proceedings of the 20th international conference on Software engineering
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Communications of the ACM
Security service level agreements: quantifiable security for the enterprise?
Proceedings of the 1999 workshop on New security paradigms
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
Augmenting the workaday world with Elvin
Proceedings of the Sixth European conference on Computer supported cooperative work
Operating system enhancements to prevent the misuse of system calls
Proceedings of the 7th ACM conference on Computer and communications security
End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
Proceedings of the 2000 workshop on New security paradigms
Design and evaluation of a wide-area event notification service
ACM Transactions on Computer Systems (TOCS)
Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world
ACM Transactions on Internet Technology (TOIT)
Pretty good persuasion: a first step towards effective password security in the real world
Proceedings of the 2001 workshop on New security paradigms
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Privacy critics: UI components to safeguard users' privacy
CHI '99 Extended Abstracts on Human Factors in Computing Systems
Rapide: A Language and Toolset for Causal Event Modeling of Distributed System Architectures
WWCA '98 Proceedings of the Second International Conference on Worldwide Computing and Its Applications
Making Passwords Secure and Usable
HCI 97 Proceedings of HCI on People and Computers XII
Toward a Taxonomy and Costing Method for Security Services
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Calculating costs for quality of security service
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Visualizing the global topology of the MBone
INFOVIS '96 Proceedings of the 1996 IEEE Symposium on Information Visualization (INFOVIS '96)
Incremental assurance for multilevel applications
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
What we talk about when we talk about context
Personal and Ubiquitous Computing
A PIN-entry method resilient against shoulder surfing
Proceedings of the 11th ACM conference on Computer and communications security
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Two experiences designing for effective security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Stopping spyware at the gate: a user study of privacy, notice and spyware
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Social navigation as a model for usable security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Security and usability engineering with particular attention to electronic mail
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Is usable security an oxymoron?
interactions - A contradiction in terms?
Aligning usability and security: a usability study of Polaris
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Talc: using desktop graffiti to fight software vulnerability
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Enhancing research into usable privacy and security
Proceedings of the 27th ACM international conference on Design of communication
Heuristics for evaluating IT security management tools
Proceedings of the Seventh Symposium on Usable Privacy and Security
Analysis and design of graphical password techniques
ISVC'06 Proceedings of the Second international conference on Advances in Visual Computing - Volume Part II
Bringing the user back into control: a new paradigm for usability in highly dynamic systems
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
A method for incorporating usable security into computer security courses
Proceeding of the 44th ACM technical symposium on Computer science education
Information security strategies: towards an organizational multi-strategy perspective
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
The thorny problem of usability has been recognized in the security community for many years, but has, so far, eluded systematic solution. We characterize the problem as a gap between theoretical and effective levels of security, and consider the characteristics of the problem. The approach we are taking focuses on visibility -- how can we make relevant features of the security context apparent to users, in order to allow them to make informed decisions about their actions and the potential implications of those actions?