Usable Security Project
Western Illinois University
 
 
Welcome to Usable Security Education Project Home Page
  

Section 3: Access Control - Reference

Publications

  1. Survey of Graphical Passwords, Xiaoyuan Suo Ying Zhu G. Scott. Owen, Department of Computer Science, Georgia State University.
  2. A Comparison of Commercial and Military Computer Security Policies, D.D. Clark and D.R. Wilson, Proc. of the IEEE Symposium on Security and Privacy, 1987.
  3. Access Control for Home Data Sharing: Attitudes, Needs and Practices, Michelle L. Mazurek, et. al., CMU CyLab tech rep, 09-013.
  4. Usable Mandatory Integrity Protection for Operating Systems, Ninghui Li, Ziqing Mao and Hong Chen, Proc. of the 2007 IEEE Symposium on Security and Privacy, 2007.
  5. Assessment of Access Control System, National Institute of Standards and Technology, IR 7316.
  6. Expandable Grids for Visualizing and Authoring Computer Security Policies, Robert W. Reeder, et. al., CHI 2008.
  7. Role-Based Access Control Models, Ravi S. Sandhu, Edward J. Coyne, IEEE Computer, 1996.
  8. Protection of Information in Computer Systems, Jerome H. Saltzer, Micahel D. Schroeder, CACM, July 1974.
  9. Human selection of mnemonic phrase-based passwords, SOUPS 2006.
  10. Graphical Passwords: Learning from the First Twelve Years, S. Chiasson, ACM Computing Surveys.
  11. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords, Tari, Ozok, and Holden, SOUPS 2006.
  12. Nokia Usable Access Control Inside Home Networks, Kari Kostiainen, et. al., Nokia TR NRC-TR-2007-009.

Links

  1. Access Control, Ben Laurie, 2008
  2. Microsoft Access Control
  3. Oracle Access Control
  4. Choosing a Good Password,
    https://www.cs.umd.edu/faq/Passwords.shtml
  5. Implementing Security Access Control (SAC)
  6. Cracking 400,000 Passwords, or How to Explain to Your Roommate why Power Bill is a Little High
  7. Distributed Hashcracking Tool
  8. Passwords revealed by sweet deal

Top

 
 
 
 
Usable Security Education © 2008
Stipes 447I
Computer Science Department
Western Illinois University
1 University Circle
Macomb IL-61455
Western Illinois University Valid XHTML 1.0 Transitional Valid XHTML 1.0 Transitional National Science Foundation
 
 
 
 

This material is based upon work supported by the National Science Foundation under Grant No. 0736643. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.