Author of the publication

Expressions of expertness: the virtuous circle of natural language for access control policy specification.

, , , and . SOUPS, page 77-88. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Expressions of expertness: the virtuous circle of natural language for access control policy specification., , , and . SOUPS, page 77-88. ACM, (2008)BonFIRE: The Clouds and Services Testbed., , , , , , , , , and 6 other author(s). CloudCom (2), page 321-326. IEEE Computer Society, (2013)978-0-7695-5095-4.The true cost of unusable password policies: password use in the wild., and . CHI, page 383-392. ACM, (2010)BonFIRE: the Clouds and Services Testbed, , , , , , , , , and 6 other author(s). IEEE CloudCom, (2013)Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication., , , and . NSS, page 81-88. IEEE, (2011)A stealth approach to usable security: helping IT security managers to identify workable security solutions., , , and . NSPW, page 33-50. ACM, (2010)Evaluating the usability and security of a graphical one-time PIN system., , and . BCS HCI, page 88-97. ACM, (2010)Counting the Cost of FIRE - Overcoming Barriers to Sustainable Experimentation Facilities., , and . Future Internet Assembly, volume 7858 of Lecture Notes in Computer Science, page 297-309. Springer, (2013)Usability meets access control: challenges and research opportunities., , , , and . SACMAT, page 73-74. ACM, (2009)Information security as organizational power: A framework for re-thinking security policies., and . STAST, page 9-16. IEEE, (2011)