Making Devices Trustworthy : Security and Trust Feedback in the Internet of Things
暂无分享,去创建一个
Manfred Tscheligi | Christina Hochleitner | Cornelia Graf | Dominik Unger | M. Tscheligi | C. Hochleitner | Cornelia Graf | D. Unger
[1] Manfred Tscheligi,et al. A Pattern Collection for Privacy Enhancing Technology , 2010 .
[2] P. Dourish,et al. Media as Material: Information Representations as Material Foundations for Organizational Practice , 2011 .
[3] Kirstie Hawkey,et al. It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls , 2010, SafeConfig '10.
[4] Kori Inkpen Quinn,et al. PrivateBits: managing visual privacy in web browsers , 2007, GI '07.
[5] Henry H. Emurian,et al. An overview of online trust: Concepts, elements, and implications , 2005, Comput. Hum. Behav..
[6] E. Uslaner. The Moral Foundations of Trust , 2002 .
[7] Yang Zhong,et al. Remote Neonatal Pain Assessment System Based on Internet of Things , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[8] Adam Marx. Using metaphor effectively in user interface design , 1994, CHI '94.
[9] Lorrie Faith Cranor,et al. Improving Computer Security Dialogs , 2011, INTERACT.
[10] Ka-Ping Yee,et al. Guidelines and Strategies for Secure Interaction Design , 2005 .
[11] Geir M. Køien,et al. Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context , 2011, Wirel. Pers. Commun..
[12] Lorrie Faith Cranor,et al. A "nutrition label" for privacy , 2009, SOUPS.
[13] Serge Gutwirth,et al. Legal safeguards for privacy and data protection in ambient intelligence , 2008, Personal and Ubiquitous Computing.
[14] Mary Ellen Zurko. User-centered security: stepping up to the grand challenge , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[15] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[16] Adrian David Cheok,et al. A mobile pet wearable computer and mixed reality system for human–poultry interaction through the internet , 2006, Personal and Ubiquitous Computing.
[17] Peter Friess,et al. Internet of Things Strategic Research Roadmap , 2011 .
[18] Manfred Tscheligi,et al. HCI for PrimeLife Prototypes , 2011, Privacy and Identity Management for Life.
[19] Jens Riegelsberger,et al. Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems , 2005, NSPW '05.
[20] Ka-Ping Yee,et al. User Interaction Design for Secure Systems , 2002, ICICS.
[21] Steven Hsu,et al. A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings , 2011, SOUPS.
[22] Marit Hansen,et al. Towards Displaying Privacy Information with Icons , 2010, PrimeLife.
[23] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[24] A. W. Roscoe,et al. Security and Usability: Analysis and Evaluation , 2010, 2010 International Conference on Availability, Reliability and Security.
[25] Nahid Shahmehri,et al. User help techniques for usable security , 2007, CHIMIT '07.
[26] Alan Cooper,et al. The Inmates are Running the Asylum , 1999, Software-Ergonomie.