Expandable grids for visualizing and authoring computer security policies
暂无分享,去创建一个
Lujo Bauer | Lorrie Faith Cranor | Michael K. Reiter | Robert W. Reeder | Kelli Bacon | Keisha How | Heather Strong | M. Reiter | Lujo Bauer | L. Cranor | R. Reeder | Kelli Bacon | Keisha How | Heather Strong
[1] Paul Dourish,et al. Seeing further: extending visualization as a basis for usable security , 2006, SOUPS '06.
[2] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[3] Marco Casassa Mont,et al. Privacy Enforcement with HP Select Access for Regulatory Compliance , 2005 .
[4] John Karat,et al. Privacy in information technology: Designing to enable privacy policy management in organizations , 2005, Int. J. Hum. Comput. Stud..
[5] Xiang Cao,et al. Intentional access management: making access control usable for end-users , 2006, SOUPS '06.
[6] Robert W. Reeder,et al. Improving user-interface dependability through mitigation of human error , 2005, Int. J. Hum. Comput. Stud..
[7] Mary Ellen Zurko,et al. A user-centered, modular authorization service built on an RBAC foundation , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[8] Nathaniel Good,et al. Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.