Usability and Security Patterns
暂无分享,去创建一个
[1] Donald A. Norman,et al. Design rules based on analyses of human error , 1983, CACM.
[2] Paul Dourish,et al. Day-to-Day : User Strategies for Managing Security as an Everyday , Practical Problem , 2003 .
[3] Jakob Nielsen,et al. Usability engineering at a discount , 1989 .
[4] Alma Whitten,et al. Making Security Usable , 2004 .
[5] Mary Ellen Zurko,et al. User-centered security , 1996, NSPW '96.
[6] Bruce Schneier,et al. Secrets and Lies , 2004 .
[7] Simson L. Garfinkel,et al. Design principles and patterns for computer systems that are simultaneously secure and usable , 2005 .
[8] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[9] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[10] Alan Cooper,et al. The Inmates are Running the Asylum , 1999, Software-Ergonomie.