Unified theories of cognition
The GOMS family of user interface analysis techniques: comparison and contrast
ACM Transactions on Computer-Human Interaction (TOCHI)
JFlow: practical mostly-static information flow control
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Communications of the ACM
A sound type system for secure flow analysis
Journal of Computer Security
Certification of programs for secure information flow
Communications of the ACM
Detecting Multiple Classes of User Errors
EHCI '01 Proceedings of the 8th IFIP International Conference on Engineering for Human-Computer Interaction
User Interaction Design for Secure Systems
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
User-Centered Security: Stepping Up to the Grand Challenge
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Formal Analysis of Human-computer Interaction using Model-checking
SEFM '05 Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods
Formal modelling of cognitive interpretation
DSVIS'06 Proceedings of the 13th international conference on Interactive systems: Design, specification, and verification
A method for formalizing, analyzing, and verifying secure user interfaces
ICFEM'06 Proceedings of the 8th international conference on Formal Methods and Software Engineering
Hi-index | 0.00 |
Most security research focuses on the technical aspects of systems. We consider security from a user-centred point of view. We focus on cognitive processes that influence security of information flow from the user to the computer system. For this, we extend our framework developed for the verification of usability properties. Finally, we consider small examples to illustrate the ideas and approach, and show how some confidentiality leaks, caused by a combination of an inappropriate design and certain aspects of human cognition, can be detected within our framework.