Practical Unix and Internet security (2nd ed.)
Practical Unix and Internet security (2nd ed.)
The invisible computer
User Interaction Design for Secure Systems
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Secrets and Lies: Digital Security in a Networked World
Secrets and Lies: Digital Security in a Networked World
Computer Security in the Real World
Computer
Using pre-release software to SPUR student learning
Proceedings of the 6th conference on Information technology education
Authentication interface evaluation and design for mobile devices
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Is usable security an oxymoron?
interactions - A contradiction in terms?
Aligning usability and security: a usability study of Polaris
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Password sharing: implications for security design based on social practice
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Bitfrost: the one laptop per child security model
Proceedings of the 3rd symposium on Usable privacy and security
PULSE: a pluggable user-space Linux security environment
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Towards improving mental models of personal firewall users
CHI '09 Extended Abstracts on Human Factors in Computing Systems
Revealing hidden context: improving mental models of personal firewall users
Proceedings of the 5th Symposium on Usable Privacy and Security
Privacy-enabling social networking over untrusted networks
Proceedings of the 2nd ACM workshop on Online social networks
The user is not the enemy: fighting malware by tracking user intentions
Proceedings of the 2008 workshop on New security paradigms
Laissez-faire file sharing: access control designed for individuals at the endpoints
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Security design based on social and cultural practice: sharing of passwords
UI-HCII'07 Proceedings of the 2nd international conference on Usability and internationalization
A sense of security in pervasive computing: is the light on when the refrigerator door is closed?
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Filter-based access control model: exploring a more usable database management
Proceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology
The web interface should be radically refactored
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
The structure of authority: why security is not a separable concern
MOZ'04 Proceedings of the Second international conference on Multiparadigm Programming in Mozart/Oz
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Use of ratings from personalized communities for trustworthy application installation
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Understanding the weaknesses of human-protocol interaction
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Usability issues in security (transcript of discussion)
SP'12 Proceedings of the 20th international conference on Security Protocols
Towards a secure human-and-computer mutual authentication protocol
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
Securing embedded user interfaces: Android and beyond
SEC'13 Proceedings of the 22nd USENIX conference on Security
"Who decides?": security and privacy in the wild
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration
Hi-index | 0.00 |
Conflicts between security and usability goals can be avoided by considering the goals together throughout an iterative design process. A successful design involves addressing usersý expectations and inferring authorization based on their acts of designation.