Sciweavers

274 search results - page 6 / 55
» Security user studies: methodologies and best practices
Sort
View
SOUPS
2009
ACM
14 years 1 months ago
A user study of the expandable grid applied to P3P privacy policy visualization
Displaying website privacy policies to consumers in ways they understand is an important part of gaining consumers’ trust and informed consent, yet most website privacy policies...
Robert W. Reeder, Patrick Gage Kelley, Aleecia M. ...
ACNS
2003
Springer
185views Cryptology» more  ACNS 2003»
14 years 19 days ago
Anonymity-Enhanced Pseudonym System
Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonyms. Such schemes are of significant practical relevance because it is the best m...
Yuko Tamura, Atsuko Miyaji
ERCIMDL
2001
Springer
128views Education» more  ERCIMDL 2001»
13 years 12 months ago
Evaluating Electronic Textbooks: A Methodology
EBONI (Electronic Books ON-screen Interface) [1] builds on the premise to emerge from the Visual Book [2] and WEB Book projects [3], that appearance is important in the design of e...
Ruth Wilson, Monica Landoni
EUROPKI
2004
Springer
14 years 23 days ago
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications
Abstract. Besides the pure technical features, the usability of a PKIenabled application plays a crucial role since the best security application will fail in practice if its usabi...
Tobias Straub, Harald Baier
ACSAC
2002
IEEE
14 years 11 days ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer