Network security: private communication in a public world
Network security: private communication in a public world
Communications of the ACM
User Interaction Design for Secure Systems
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Proceedings of the 11th USENIX Security Symposium
Digital signatures and electronic documents: a cautionary tale
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
The Design of Everyday Things
Secure long term communities in ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Authentication interface evaluation and design for mobile devices
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Laboratory experiments for network security instruction
Journal on Educational Resources in Computing (JERIC)
Human-in-the-loop: rethinking security in mobile and pervasive systems
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Towards improving mental models of personal firewall users
CHI '09 Extended Abstracts on Human Factors in Computing Systems
Revealing hidden context: improving mental models of personal firewall users
Proceedings of the 5th Symposium on Usable Privacy and Security
Browser interfaces and extended validation SSL certificates: an empirical study
Proceedings of the 2009 ACM workshop on Cloud computing security
The effects of human interaction on biometric system performance
ICDHM'07 Proceedings of the 1st international conference on Digital human modeling
Filter-based access control model: exploring a more usable database management
Proceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology
Evaluation of biometric systems: a study of users' acceptance and satisfaction
International Journal of Biometrics
Fast computation of the performance evaluation of biometric systems: Application to multibiometrics
Future Generation Computer Systems
User Perceptions of Security Technologies
International Journal of Information Security and Privacy
Towards a secure human-and-computer mutual authentication protocol
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
"Who decides?": security and privacy in the wild
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration
Hi-index | 0.00 |
The security field suffers from an endemic problem: despite our best efforts, the current infrastructure is continually full of security vulnerabilities. The systems that comprise this infrastructure also are full of boundaries and interfaces where humans and systems must interact: most secure systems exist to serve human users and carry out human-oriented processes, and are designed and built by humans. From the perspective of the human-computer interaction (HCO community), many of these interfaces do not reflect good thinking on how to make them easy to use in a manner that results in security. From the perspective of the security community, many widespread security problems arguably might stem from bad interaction between humans and systems. I recently attended a workshop (ACM/CHI 2003 Workshop on Human-Computer Interaction and Security Systems) that tried to bring together these communities to trigger further inquiry into this area. In this article, I want to discuss the workshop and how the thinking there applies to the secure systems topic this department addresses.