- 1.Berners-Lee, Tim, Robert Cailiau, Ari Luotonen, Henrik Frystk Nielsen, and Arthur Secret. "The World-Wide Web", Communications of the ACM, August 1994 Google ScholarDigital Library
- 2.Baldwin, Robert W. "'Naming and Grouping Privileges to Simplify Security", in Proceedings of the 1990 IEEE Symposium on Security and Privacy, pages 116-132, 1990Google ScholarCross Ref
- 3.Bell, D. E. and L. J. LaPadula. Secure Computer Systems: Unified Exposition and Multics, Technical Report ESD-TR-75-306, The MITRE Corp., March 1976.Google ScholarCross Ref
- 4.Blaze, Matt, Joan Feigenbaum, and Jack Lacy. "Decentralized Trust Management" in Proceedings of IEEE Conference on Security and Privacy, 1996. Google ScholarDigital Library
- 5.Clark, David D. and David R. Wilson. "A Comparison of Commercial and Military Computer Security Policies", in Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 184-195, April 1987.Google ScholarCross Ref
- 6.Clement, Andrew, "'Privacy Considerations in CSCW;' in Proceedings of CSCW '92.Google Scholar
- 7.DCE-Web home page, http://www.osf.org/www/ dceweb/index.htmlGoogle Scholar
- 8.Digital Equipmem Corporation. Visual ACL Editor Online Help. Available: Digital Equipment Corporation, Littleton, MA. 1995.Google Scholar
- 9.Ferraio|o, Janet A. Cugini, and D. Richard Kuhn, "Role- Based Access Control (RBAC): Features and Motivation," in Proceedings of Eleventh Annual Computer Security Applications Conference, December 11-15, 1995.Google Scholar
- 10.Fish, Robert S. and Robert E. Kraut. "Networking for Collaboration: Video Telephony and Media Confercncing," in Proceedings of ACM CHI '94. Google ScholarDigital Library
- 11.Foley, Simon and Jeremy Jacob. "Specifying Security for CSCW Systems:' in Proceedings of 8th IEEE Computer Security Foundations Workshop, June 13-15, 1995. Google ScholarDigital Library
- 12.Garfinkel, Simson. PGP: Pretty Good Privacy, O'Reilly and Associates, Inc., 1995. Google ScholarDigital Library
- 13.Gasser, Morrie. "Building a Secure Computer System," Van Nostrand Reinhold Company, New York, 1988. Google ScholarDigital Library
- 14.Hill, Will and Loren Tervcen. "New Uses and Abuses of Interaction History: Help Form the Research Agenda" in Proceedings of ACM CHI '94. Google ScholarDigital Library
- 15.Karat, Clare-Marie. "Iterative Usability Testing of a Security Application:' Proceedings of the Human Factors Society 33rd Annual Meeting, 1989.Google Scholar
- 16.Kling, Rob. "Controversies About Privacy and Open Information in CSCW," in Proceedings of CSCW '92. Google ScholarDigital Library
- 17.Lewontin, S. "The DCE-Web: Securing the Enterprise Web," http://www.osf.org/www/dceweb/papers/ Secure_Enterprise.html, 1995.Google Scholar
- 18.Linn, J. "Privacy-Enhanced Electronic Mail: From Architecture to Implementation", in Proceedings, IFIP TC11 Seventh International Conference on Information Security (IFIP/Sec '91), Brighton, UK, 15-17 May 1991.Google Scholar
- 19.Nash, M. and Poland, K., "Some Conundrums Concerning Separation of Duty," in Proceedings of 1990 IEEE Symposium on Security and Privacy, May 1990.Google Scholar
- 20.Norman, Donald A., '~i'he Design of Everyday Things", Doubleday, 1988.Google Scholar
- 21.Mosteller, William S. and James Ballas. "Usability Analysis of Messages from a Security System," Proceedings of the Human Factors Society 33rd Annual Meeting, 1989.Google Scholar
- 22.Nielsen, Jacob. "Usability Engineering," AP Professional, 1995. Google ScholarDigital Library
- 23.Rosenberry, Ward, David Kenney and Gerry Fisher. *'Understanding DCE" O'Reilly & Associates, Inc., 1992. Google ScholarDigital Library
- 24.Rubinstein, Richard and Harry Hersh, "q'he Human Factor: Designing Computer Systems for People" Digital Press, 1984. Google ScholarDigital Library
- 25.Saltzer, Jerome H. and Michael D. Schroeder. "The Protection of Information in Computer Systems", in Proceedings of the IEEE, 63(9), 1975.Google ScholarCross Ref
- 26.Shen, HongHai and Prasun Dewan. "Access Control for Collaborative Environments" Proceedings of CSCW '92. Google ScholarDigital Library
- 27.Wixon, Dennis, Karen Holtzblatt, and Stephen Knox. "Contextual Design: An Emergent View of System Design", in CHI '90 Conference Proceedings. Google ScholarDigital Library
- 28.Zurko, Mary Ellen. "Attribute Support for Inter-Domain Use", in Proceedings of The Computer Security Foundations Workshop V, June 1992.Google Scholar
- 29.Zurko, Mary Ellen. Adage home page, http:il www.osf.org/www/adage/index.html.Google Scholar
- 30.Zurko, Mary Ellen. MAP home page, http:// www.osf.org/www/map/index.html.Google Scholar
Index Terms
- User-centered security
Recommendations
Aspects of Internet Security
Internet standards development requires consideration of security issues in the protocols. But what does “security” mean in this context? We often conflate several different aspects into the blanket term “security.” Here, the ...
Enabling Multi-user Controls in Smart Home Devices
IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and PrivacyThe Internet of Things (IoT) devices have expanded into many aspects of everyday life. As these smart home devices grow more popular, security concerns increase. Researchers have modeled the privacy and security threats for smart home devices, but have ...
Integrated Security Framework for Secure Web Services
IITSI '10: Proceedings of the 2010 Third International Symposium on Intelligent Information Technology and Security InformaticsTo address the challenges in Web services security, the author firstly analyzed threats facing Web services and related security standards, presented integrated security framework based on use of authentication, authorization, confidentiality, and ...
Comments