In the eye of the beholder: A visualization-based approach to information system security
暂无分享,去创建一个
Paul Dourish | Rogério Abreu de Paula | Xianghua Ding | Jie Ren | Jennifer Ann Rode | Kari Nies | David F. Redmiles | Ben Pillet | Luiz Roberto Silva Filho | P. Dourish | J. Rode | J. Ren | D. Redmiles | K. Nies | R. Paula | X. Ding | Ben Pillet
[1] Mark W. Newman,et al. Listening in: practices surrounding iTunes music sharing , 2005, CHI.
[2] Cynthia E. Irvine,et al. Toward a taxonomy and costing method for security services , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[3] R. Jagannathan,et al. A prototype real-time intrusion-detection expert system , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[4] Steven Pemberton,et al. CHI '97 Extended Abstracts on Human Factors in Computing Systems , 1997, CHI 1997.
[5] Cynthia E. Irvine,et al. Quality of security service , 2001, NSPW '00.
[6] C. Bullard. Shaping technology/Building society , 1994 .
[7] Nathaniel Good,et al. Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.
[8] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[9] David F. Redmiles,et al. Creating an Infrastructure for Ubiquitous Awareness , 2001, INTERACT.
[10] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[11] E. James Whitehead,et al. HTTP Extensions for Distributed Authoring - WEBDAV , 1999, RFC.
[12] Dan Thompson,et al. Incremental assurance for multilevel applications , 1997, Proceedings 13th Annual Computer Security Applications Conference.
[13] Massimo Bernaschi,et al. Operating system enhancements to prevent the misuse of system calls , 2000, CCS.
[14] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[15] Marvin Theimer,et al. The Doctor Is In: Helping End Users Understand the Health of Distributed Systems , 2000, DSOM.
[16] Mary Ellen Zurko,et al. User-centered security , 1996, NSPW '96.
[17] B. Latour. 10 ''Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts'' , 1992 .
[18] Harold Thimbleby,et al. Proceedings of HCI on People and Computers XII , 1997 .
[19] Jonathan K. Millen,et al. Three systems for cryptographic protocol analysis , 1994, Journal of Cryptology.
[20] Tamara Munzner,et al. Visualizing the global topology of the MBone , 1996, Proceedings IEEE Symposium on Information Visualization '96.
[21] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[22] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[23] Cynthia E. Irvine,et al. Calculating costs for quality of security service , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[24] Paul Dourish,et al. Two experiences designing for effective security , 2005, SOUPS '05.
[25] Saul Greenberg,et al. Real time groupware as a distributed system: concurrency control and its effect on the interface , 1994, CSCW '94.
[26] Serge Vaudenay,et al. Proceedings of the 5th International Workshop on Fast Software Encryption , 1998 .
[27] David S. Rosenblum,et al. Design and evaluation of a wide-area event notification service , 2001, TOCS.
[28] Mark S. Ackerman,et al. Privacy critics: UI components to safeguard users' privacy , 1999, CHI Extended Abstracts.
[29] Prasun Dewan,et al. Flexible meta access-control for collaborative applications , 1998, CSCW '98.
[30] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[31] D. Pinto. Secrets and Lies: Digital Security in a Networked World , 2003 .
[32] M. Angela Sasse,et al. Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.
[33] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[34] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[35] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[36] Morrie Gasser,et al. Security Kernel Design and Implementation: An Introduction , 1983, Computer.
[37] David D. Clark,et al. Rethinking the design of the Internet , 2001, ACM Trans. Internet Techn..
[38] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[39] Prasun Dewan,et al. Access control for collaborative environments , 1992, CSCW '92.
[40] Daniel G. Bobrow,et al. Design for Conversation: Lessons from Cognoter , 1991, Int. J. Man Mach. Stud..
[41] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[42] P. Dourish. Privacy , Security ... and Risk and Danger and Secrecy and Trust and Morality and Identity and Power : Understanding Collective Information Practices , 2005 .
[43] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[44] D. Saunders. The brave new world , 1999 .
[45] Gilbert Cockton,et al. People and Computers XIV — Usability or Else! , 2000, Springer London.
[46] David F. Redmiles,et al. The design of a configurable, extensible and dynamic notification service , 2003, DEBS '03.
[47] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[48] M. Angela Sasse,et al. Making Passwords Secure and Usable , 1997, BCS HCI.
[49] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[50] Raphael A. Finkel,et al. Pulsar: an extensible tool for monitoring large Unix sites , 1997, Softw. Pract. Exp..
[51] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[52] Bruce Schneier,et al. Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP) , 1998, CCS '98.
[53] Johanna D. Moore,et al. Proceedings of the Conference on Human Factors in Computing Systems , 1989 .
[54] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[55] M. Angela Sasse,et al. Pretty good persuasion: a first step towards effective password security in the real world , 2001, NSPW '01.
[56] Bruce Schneier,et al. Cryptanalytic Attacks on Pseudorandom Number Generators , 1998, FSE.
[57] Paul Dourish,et al. An approach to usable security based on event monitoring and visualization , 2002, NSPW '02.
[58] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[59] Paul Dourish,et al. Culture and Control in a Media Space , 1993, ECSCW.
[60] Ronda R. Henning,et al. Security service level agreements: quantifiable security for the enterprise? , 1999, NSPW '99.
[61] Ross J. Anderson. Why cryptosystems fail , 1994, CACM.