Usable Access Control inside Home Networks
暂无分享,去创建一个
Virpi Roto | Kari Kostiainen | Kristiina Karvonen | Seamus Moloney | Olli Rantapuska | Ursula Holmstrom
[1] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[2] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[3] Wolfgang Müller,et al. Secure Profile Management in Smart Home Networks , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).
[4] Sangwook Kim,et al. Security service framework for home network , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).
[5] Hans Scholten,et al. Home Network Security , 2008, Seventh International Conference on Networking (icn 2008).
[6] Constance Fleuriot,et al. Girls, technology and privacy: "is my mother listening?" , 2006, CHI.
[7] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[8] Jun-Ho Lee,et al. Role-based Access Control Model in Home Network Environments , 2007 .
[9] S. Ungar,et al. Home network security , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).
[10] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[11] Frank Stajano,et al. Usability of Security Management: Defining the Permissions of Guests , 2006, Security Protocols Workshop.
[12] Stephen Farrell,et al. Towards security auto-configuration for smart appliances , 2003 .
[13] Pekka Nikander,et al. Users and Trust in Cyberspace , 2000, Security Protocols Workshop.
[14] Diana K. Smetters,et al. In search of usable security: five lessons from the field , 2004, IEEE Security & Privacy Magazine.
[15] Karen Holtzblatt,et al. Contextual design , 1997, INTR.
[16] Kevin Driscoll,et al. Making Home Automation Communications Secure , 2001, Computer.
[17] Ka-Ping Yee,et al. User Interaction Design for Secure Systems , 2002, ICICS.