Enabling enterprise-scale systems using cloud-based personal media
暂无分享,去创建一个
[1] Rob Miller,et al. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express , 2005, SOUPS '05.
[2] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[3] Sidney S. Fels,et al. Lessons from ICT design of a healthcare worker-centered system for a chronic mental care hospital , 2014, CHI Extended Abstracts.
[4] Enrique Castro-Leon. Consumerization in the IT Service Ecosystem , 2014, IT Professional.
[5] Matthew Smith,et al. Helping Johnny 2.0 to encrypt his Facebook conversations , 2012, SOUPS.
[6] Uwe Röhm,et al. User Awareness and Policy Compliance of Data Privacy in Cloud Computing , 2013, AWC.
[7] 白石 善明,et al. "Confused Johnny: When Automatic Encryption Leads to Confusion and Mistakes"の紹介 , 2013 .
[8] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[9] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[10] Leire Orue-Echevarria Arrieta. From Software as a good to software as a service: Preparing the evolution of software products into the cloud , 2012, 2012 IEEE 6th International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA).
[11] Sidney S. Fels,et al. Seamless And Always-on Security in a Bring-Your-Own-Application World , 2015, CHI Extended Abstracts.