skip to main content
10.1145/304851.304859acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free Access

User-centered security

Authors Info & Claims
Published:17 September 1996Publication History
First page image

References

  1. 1.Berners-Lee, Tim, Robert Cailiau, Ari Luotonen, Henrik Frystk Nielsen, and Arthur Secret. "The World-Wide Web", Communications of the ACM, August 1994 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.Baldwin, Robert W. "'Naming and Grouping Privileges to Simplify Security", in Proceedings of the 1990 IEEE Symposium on Security and Privacy, pages 116-132, 1990Google ScholarGoogle ScholarCross RefCross Ref
  3. 3.Bell, D. E. and L. J. LaPadula. Secure Computer Systems: Unified Exposition and Multics, Technical Report ESD-TR-75-306, The MITRE Corp., March 1976.Google ScholarGoogle ScholarCross RefCross Ref
  4. 4.Blaze, Matt, Joan Feigenbaum, and Jack Lacy. "Decentralized Trust Management" in Proceedings of IEEE Conference on Security and Privacy, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.Clark, David D. and David R. Wilson. "A Comparison of Commercial and Military Computer Security Policies", in Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 184-195, April 1987.Google ScholarGoogle ScholarCross RefCross Ref
  6. 6.Clement, Andrew, "'Privacy Considerations in CSCW;' in Proceedings of CSCW '92.Google ScholarGoogle Scholar
  7. 7.DCE-Web home page, http://www.osf.org/www/ dceweb/index.htmlGoogle ScholarGoogle Scholar
  8. 8.Digital Equipmem Corporation. Visual ACL Editor Online Help. Available: Digital Equipment Corporation, Littleton, MA. 1995.Google ScholarGoogle Scholar
  9. 9.Ferraio|o, Janet A. Cugini, and D. Richard Kuhn, "Role- Based Access Control (RBAC): Features and Motivation," in Proceedings of Eleventh Annual Computer Security Applications Conference, December 11-15, 1995.Google ScholarGoogle Scholar
  10. 10.Fish, Robert S. and Robert E. Kraut. "Networking for Collaboration: Video Telephony and Media Confercncing," in Proceedings of ACM CHI '94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.Foley, Simon and Jeremy Jacob. "Specifying Security for CSCW Systems:' in Proceedings of 8th IEEE Computer Security Foundations Workshop, June 13-15, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.Garfinkel, Simson. PGP: Pretty Good Privacy, O'Reilly and Associates, Inc., 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.Gasser, Morrie. "Building a Secure Computer System," Van Nostrand Reinhold Company, New York, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.Hill, Will and Loren Tervcen. "New Uses and Abuses of Interaction History: Help Form the Research Agenda" in Proceedings of ACM CHI '94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.Karat, Clare-Marie. "Iterative Usability Testing of a Security Application:' Proceedings of the Human Factors Society 33rd Annual Meeting, 1989.Google ScholarGoogle Scholar
  16. 16.Kling, Rob. "Controversies About Privacy and Open Information in CSCW," in Proceedings of CSCW '92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.Lewontin, S. "The DCE-Web: Securing the Enterprise Web," http://www.osf.org/www/dceweb/papers/ Secure_Enterprise.html, 1995.Google ScholarGoogle Scholar
  18. 18.Linn, J. "Privacy-Enhanced Electronic Mail: From Architecture to Implementation", in Proceedings, IFIP TC11 Seventh International Conference on Information Security (IFIP/Sec '91), Brighton, UK, 15-17 May 1991.Google ScholarGoogle Scholar
  19. 19.Nash, M. and Poland, K., "Some Conundrums Concerning Separation of Duty," in Proceedings of 1990 IEEE Symposium on Security and Privacy, May 1990.Google ScholarGoogle Scholar
  20. 20.Norman, Donald A., '~i'he Design of Everyday Things", Doubleday, 1988.Google ScholarGoogle Scholar
  21. 21.Mosteller, William S. and James Ballas. "Usability Analysis of Messages from a Security System," Proceedings of the Human Factors Society 33rd Annual Meeting, 1989.Google ScholarGoogle Scholar
  22. 22.Nielsen, Jacob. "Usability Engineering," AP Professional, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.Rosenberry, Ward, David Kenney and Gerry Fisher. *'Understanding DCE" O'Reilly & Associates, Inc., 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.Rubinstein, Richard and Harry Hersh, "q'he Human Factor: Designing Computer Systems for People" Digital Press, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25.Saltzer, Jerome H. and Michael D. Schroeder. "The Protection of Information in Computer Systems", in Proceedings of the IEEE, 63(9), 1975.Google ScholarGoogle ScholarCross RefCross Ref
  26. 26.Shen, HongHai and Prasun Dewan. "Access Control for Collaborative Environments" Proceedings of CSCW '92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. 27.Wixon, Dennis, Karen Holtzblatt, and Stephen Knox. "Contextual Design: An Emergent View of System Design", in CHI '90 Conference Proceedings. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. 28.Zurko, Mary Ellen. "Attribute Support for Inter-Domain Use", in Proceedings of The Computer Security Foundations Workshop V, June 1992.Google ScholarGoogle Scholar
  29. 29.Zurko, Mary Ellen. Adage home page, http:il www.osf.org/www/adage/index.html.Google ScholarGoogle Scholar
  30. 30.Zurko, Mary Ellen. MAP home page, http:// www.osf.org/www/map/index.html.Google ScholarGoogle Scholar

Index Terms

  1. User-centered security

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          NSPW '96: Proceedings of the 1996 workshop on New security paradigms
          September 1996
          153 pages
          ISBN:0897919440
          DOI:10.1145/304851

          Copyright © 1996 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 17 September 1996

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate62of170submissions,36%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader