|
 |
 |
Welcome to Usable Security Education Project Home Page |
|
Publications
-
Survey of Graphical Passwords, Xiaoyuan Suo Ying Zhu G. Scott. Owen, Department of Computer Science, Georgia State University.
-
A Comparison of Commercial and Military Computer Security Policies,
D.D. Clark and D.R. Wilson, Proc. of the IEEE Symposium on Security and Privacy, 1987.
- Access Control for Home Data Sharing: Attitudes, Needs and Practices, Michelle L. Mazurek, et. al., CMU CyLab tech rep, 09-013.
- Usable Mandatory Integrity Protection for Operating Systems, Ninghui Li, Ziqing Mao and Hong Chen, Proc. of the 2007 IEEE Symposium on Security and Privacy, 2007.
-
Assessment of Access Control System, National Institute of Standards
and Technology, IR 7316.
-
Expandable Grids for Visualizing and Authoring Computer Security Policies,
Robert W. Reeder, et. al., CHI 2008.
-
Role-Based
Access Control Models, Ravi S. Sandhu, Edward J. Coyne,
IEEE Computer, 1996.
-
Protection of Information in Computer Systems, Jerome H. Saltzer,
Micahel D. Schroeder, CACM, July 1974.
- Human selection of mnemonic phrase-based passwords, SOUPS 2006.
-
Graphical Passwords: Learning from the First Twelve Years, S. Chiasson, ACM Computing Surveys.
- A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords, Tari, Ozok, and Holden, SOUPS 2006.
- Nokia Usable Access Control Inside Home Networks, Kari Kostiainen, et. al., Nokia TR NRC-TR-2007-009.
Links
-
Access Control,
Ben Laurie, 2008
- Microsoft Access Control
- Oracle Access Control
-
Choosing a Good Password,
https://www.cs.umd.edu/faq/Passwords.shtml
- Implementing Security Access Control (SAC)
-
Cracking 400,000 Passwords, or How to Explain to Your Roommate why Power Bill is a Little High
- Distributed Hashcracking Tool
-
Passwords revealed by sweet deal
Top
|
|
This material is based upon work supported by the National Science Foundation under Grant No. 0736643. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
|