Properties of protection goals and their integration into a user interface
暂无分享,去创建一个
[1] Patty Curthoys,et al. Developing user interfaces: Ensuring usability through product and process , 1997 .
[2] B. Schneiderman,et al. Designing the User Interface. Strategies for Effective Human-Computer Interaction , 1992 .
[3] R. Dierstein. The Concept of Secure Information Processing Systems and their Basic Functions. , 1990 .
[4] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[5] H. Rex Hartson,et al. Developing user interfaces: ensuring usability through product & process , 1993 .
[6] Ben Shneiderman,et al. Designing the User Interface: Strategies for Effective Human-Computer Interaction , 1998 .
[7] Hannes Federrath,et al. Security in Public Mobile Communication Networks , 1995 .
[8] Martin Reichenbach,et al. Individual management of personal reachability in mobile communication , 1997, SEC.
[9] P. S. Tasker,et al. DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .
[10] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[11] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[12] Alexander Schill,et al. A Java-Based Distributed Platform for Multilateral Security , 1998, Trends in Distributed Systems for Electronic Commerce.