Sciweavers

118 search results - page 10 / 24
» Aligning usability and security: a usability study of Polari...
Sort
View
CHINZ
2005
ACM
13 years 9 months ago
The territory is the map: designing navigational aids
It has been shown that people encounter difficulties in using representations and devices designed to assist navigating unfamiliar terrain. Literature review and self-reported vis...
Nicola J. Bidwell, Christopher Lueg, Jeff Axup
CCS
2009
ACM
14 years 12 days ago
Multiple password interference in text passwords and click-based graphical passwords
The underlying issues relating to the usability and security of multiple passwords are largely unexplored. However, we know that people generally have difficulty remembering mult...
Sonia Chiasson, Alain Forget, Elizabeth Stobert, P...
CHIMIT
2008
ACM
13 years 9 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
ESORICS
2008
Springer
13 years 9 months ago
CPU Bugs, CPU Backdoors and Consequences on Security
In this paper, we present the security implications of x86 processor bugs or backdoors on operating systems and virtual machine monitors. We will not try to determine whether the b...
Loïc Duflot
HCSE
2010
13 years 5 months ago
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats end...
Shamal Faily, Ivan Flechais