Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
D. Balfanz, G. Durfee, R. E. Grinter, D. K. Smetters, P. Stewart, Network in a Box: How to set up a secure wireless network in under a minute, Proc. 13th USENIX Security Symposium (2004), p. 204–221, available online at http://www.parc.com/research/publications/files/5180.pdf
K. Botzum, WebSphere Application Server V6.1: What’s new in security?, http://www-128.ibm.com/developerworks/websphere/library/techarticles/ 0606_botzum/0606_botzum.html
M. A. Caloyannides, Privacy Protection and Computer Forensics (Second Edition), Artech House, 2004
S. Garfinkel, Sanitization and Usability, Kapitel 15 in L. F. Cranor, S. Garfinkel (Eds.): Security and Usability – Designing Secure Systems that People Can Use, O’Reilly, 2005
S. Garfinkel, J. Schiller, E. Nordlander, D. Margrave, R. Miller, How To Make Secure Email Easier To Use, Proc. CHI 2005: Technology, Safety, Community, Portland, Oregon, April 2–7, 2005, online at http://www.simson.net/cv/pubs.php
S. Garfinkel, J. Schiller, E. Nordlander, D. Margrave, R. Miller, Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce, in: A. S. Patrick, M. Yung (Eds.), Proc. Ninth International Conference on Financial Cryptography and Data Security, Springer-Verlag 2005, online at http://www.simson.net/cv/pubs.php
S. Garfinkel, R. Miller, Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express, presented at the Symposium on Usable Privacy and Security (SOUPS 2005), July 6–8, 2005, Pittsburgh, PA, online at http://www.simson.net/cv/pubs.php
P. Gutmann, Security Usability Fundamentals, Draft 2008, http://www.cs.auckland.ac.nz/∼pgut001/pubs/usability.pdf
W. Kriha, R. Schmitz, Usability und Security, in KES 03/2007, Zeitschrift des Bundesamtes für Sicherheit in der Informationstechnik, http://www.bsi.bund.de/literat/forumkes/kes0307.pdf
G. Lakoff, Women, Fire and Dangerous Things – what categories reveal about the mind. University of Chicago Press 1987
Mozilla Trustbar Screenshots, http://trustbar.mozdev.org/screenshots.html #not_secured
P. Eronen, H. Tschofenig, Pre-Shared Key Ciphersuites for Transport Layer Security (TLS), http://www.ietf.org/rfc/rfc4279.txt
N. Stephenson, Die Diktatur des schönen Scheins – Wie grafische Oberflächen Computernutzer entmündigen, Goldmann 2002
M. Stiegler, An Introduction to Petname Systems, http://www.skyhunter.com/marcs/petnames/IntroPetNames.html
M. Stiegler, The Skynet Virus: Why it is unstoppable; How to stop it (Video), http://www.skyhunter.com/marcs/skynet.wmv
Verified by Visa Konzept, siehe http://usa.visa.com/personal/security/visa_security _program/vbv/how_it_works.html
A. Whitten, J. D. Tygar, Why Jonny Can’t Encrypt, Kapitel 34 in L. F. Cranor, S. Garfinkel (Eds.): Security and Usability – Designing Secure Systems that People Can Use, O’Reilly, 2005 (ursprünglich in Proc. 8th USENIX Security Syposium, Washington, D.C., 1999
K. P. Yee, User Interaction Design for Secure Systems, Berkeley University Tech Report CSD-02-1184, 2002. Online at http://www.sims.berkeley.edu/∼ping/sid/uidss-may-28.pdf
K. P. Yee, Guidelines and Strategies for Secure Interaction Design, Kapitel 13 in in L. F. Cranor, S. Garfinkel (Eds.): Security and Usability – Designing Secure Systems that People Can Use, O’Reilly, 2005
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Schmitz, R., Kriha, W. (2009). Security und Usability . In: Sichere Systeme. Xpert.press. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78959-8_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-78959-8_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78958-1
Online ISBN: 978-3-540-78959-8
eBook Packages: Computer Science and Engineering (German Language)