A user study of policy creation in a flexible access-control system
暂无分享,去创建一个
[1] Lujo Bauer,et al. Lessons learned from the deployment of a smartphone-based access-control system , 2007, SOUPS '07.
[2] Xiang Cao,et al. Intentional access management: making access control usable for end-users , 2006, SOUPS '06.
[3] Robert W. Reeder,et al. Improving user-interface dependability through mitigation of human error , 2005, Int. J. Hum. Comput. Stud..
[4] David F. Ferraiolo,et al. An Examination of Federal and Commercial Access Control Policy Needs , 1993 .
[5] Ninghui Li,et al. Understanding SPKI/SDSI using first-order logic , 2005, International Journal of Information Security.
[6] Andrew W. Appel,et al. Proof-carrying authentication , 1999, CCS '99.
[7] Diana K. Smetters,et al. User experiences with sharing and access control , 2006, CHI EA '06.
[8] Lujo Bauer,et al. Device-Enabled Authorization in the Grey System ¶ , 2006 .
[9] Roy H. Campbell,et al. KNOW Why your access was denied: regulating feedback for usable security , 2004, CCS '04.
[10] Lujo Bauer,et al. Efficient Proving for Practical Distributed Access-Control Systems , 2007, ESORICS.
[11] Lionel M. Ni,et al. The master key: a private authentication approach for pervasive computing environments , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[12] James A. Landay,et al. Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.
[13] Martín Abadi,et al. On SDSI's linked local name spaces , 1997, Proceedings 10th Computer Security Foundations Workshop.
[14] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[15] Philippe Bonnet,et al. Personal servers as digital keys , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.