HCI Bibliography Home | HCI Conferences | SOUPS Archive | Detailed Records | RefWorks | EndNote | Show Abstracts
SOUPS Tables of Contents: 0506070809101112131415

Proceedings of the 2006 Symposium on Usable Privacy and Security

Fullname:Symposium on Usable Privacy and Security
Editors:Lorrie Faith Cranor; Clare-Marie Karat; Diana Smetters
Location:Pittsburgh, Pennsylvania
Dates:2006-Jul-12 to 2006-Jul-14
Publisher:ACM
Standard No:ISBN 1-59593-448-0; ACM DL: Table of Contents hcibib: SOUPS06
Papers:14
Pages:155
Links:Conference Home Page
  1. Intelligible access control
  2. Password management, mnemonics, and mother's maiden names
  3. Catching phish
  4. Risk transparency

Intelligible access control

Aligning usability and security: a usability study of Polaris BIBAFull-TextPDF 1-7
  Alexander J. DeWitt; Jasna Kuljis
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench BIBAFull-TextPDF 8-19
  Carolyn A. Brodie; Clare-Marie Karat; John Karat
Intentional access management: making access control usable for end-users BIBAFull-TextPDF 20-31
  Xiang Cao; Lee Iverson

Password management, mnemonics, and mother's maiden names

Passpet: convenient password management and phishing protection BIBAFull-TextPDFSlides 32-43
  Ka-Ping Yee; Kragen Sitaker
Password management strategies for online accounts BIBAFull-TextPDFSlides 44-55
  Shirley Gaw; Edward W. Felten
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords BIBAFull-TextPDF 56-66
  Furkan Tari; A. Ant Ozok; Stephen H. Holden
Human selection of mnemonic phrase-based passwords BIBAFull-TextPDFSlides 67-78
  Cynthia Kuo; Sasha Romanosky; Lorrie Faith Cranor

Catching phish

Decision strategies and susceptibility to phishing BIBAFull-TextPDF 79-90
  Julie S. Downs; Mandy B. Holbrook; Lorrie Faith Cranor
The methodology and an application to fight against Unicode attacks BIBAFull-TextPDF 91-101
  Anthony Y. Fu; Xiaotie Deng; Liu Wenyin; Greg Little
Web wallet: preventing phishing attacks by revealing user intentions BIBAFull-TextPDF 102-113
  Min Wu; Robert C. Miller; Greg Little

Risk transparency

Privacy and security threat analysis of the federal employee personal identity verification (PIV) program BIBAFull-TextPDFSlides 114-121
  Paul A. Karger
Protecting domestic power-line communications BIBAFull-TextPDF 122-132
  Richard Newman; Sherman Gavette; Larry Yonge; Ross Anderson
Power strips, prophylactics, and privacy, oh my! BIBAFull-TextPDFSlides 133-144
  Julia Gideon; Lorrie Cranor; Serge Egelman; Alessandro Acquisti
Seeing further: extending visualization as a basis for usable security BIBAFull-TextPDFPDF 145-155
  Jennifer Rode; Carolina Johansson; Paul DiGioia; Roberto Silva Filho; Kari Nies; David H. Nguyen; Jie Ren; Paul Dourish; David Redmiles