HCI Bibliography Home | HCI Conferences | SOUPS Archive | Detailed Records | RefWorks | EndNote | Show Abstracts
SOUPS Tables of Contents: 0506070809101112131415

Proceedings of the 2008 Symposium on Usable Privacy and Security

Fullname:Symposium on Usable Privacy and Security
Editors:Lorrie Faith Cranor; Jason Hong; Simson L. Garfinkel
Location:Pittsburgh, Pennsylvania
Dates:2008-Jul-23 to 2008-Jul-25
Standard No:ISBN 1-60558-276-X, 978-1-60558-276-4; ACM DL: Table of Contents hcibib: SOUPS08
Links:Conference Home Page
  1. Authentication I
  2. Authentication II
  3. Configuration and policies
  4. Usable privacy and security in practice

Authentication I

Improving text passwords through persuasion BIBAFull-Text 1-12
  Alain Forget; Sonia Chiasson; P. C. van Oorschot; Robert Biddle
Personal knowledge questions for fallback authentication: security questions in the era of Facebook BIBAFull-Text 13-23
  Ariel Rabkin
Securing passfaces for description BIBAFull-Text 24-35
  Paul Dunphy; James Nicholson; Patrick Olivier

Authentication II

Use Your Illusion: secure authentication usable anywhere BIBAFull-Text 35-45
  Eiji Hayashi; Rachna Dhamija; Nicolas Christin; Adrian Perrig
Usability of CAPTCHAs or usability issues in CAPTCHA design BIBAFull-Text 44-52
  Jeff Yan; Ahmad Salah El Ahmad
Universal device pairing using an auxiliary device BIBAFull-Text 56-67
  Nitesh Saxena; Md. Borhan Uddin; Jonathan Voris

Configuration and policies

Evaluating assistance of natural language policy authoring BIBAFull-Text 65-73
  Kami Vaniea; Clare-Marie Karat; Joshua B. Gross; John Karat; Carolyn Brodie
Expressions of expertness: the virtuous circle of natural language for access control policy specification BIBAFull-Text 77-88
  Philip Inglesant; M. Angela Sasse; David Chadwick; Lei Lei Shi
Evaluating the usability of usage controls in electronic collaboration BIBAFull-Text 85-92
  José C. Brustoloni; Ricardo Villamarín-Salomón; Peter Djalaliev; David Kyle

Usable privacy and security in practice

A user study of off-the-record messaging BIBAFull-Text 95-104
  Ryan Stedman; Kayo Yoshida; Ian Goldberg
The challenges of using an intrusion detection system: is it worth the effort? BIBAFull-Text 107-118
  Rodrigo Werlinger; Kirstie Hawkey; Kasia Muldner; Pooya Jaferian; Konstantin Beznosov
Analyzing websites for user-visible security design flaws BIBAFull-Text 117-126
  Laura Falk; Atul Prakash; Kevin Borders