Quantcast
Channel: Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE)
Browsing all 9 articles
Browse latest View live

Human Factor in Security Administration: Brainstorming the Research Directions

Although usability has been acknowledged by the security community as one of the design goals back in 1970s, there is dearth of applications of HCI methods to the domain of computer security in general...

View Article



Improving Practical Security Engineering: Overview of the Ongoing Research

Security engineering is about creating viable solutions to real-world security problems-solutions that would address the requirements, be cost-effective, competitive, and yet be subject to the...

View Article

Toward Usable Security Administration

Administration of protection mechanisms for large networked information enterprises is challenging due to large numbers of application instances resources and users, complex and dynamic business...

View Article

Toward Usable Security Administration

Administration of protection mechanisms for large networked information enterprises is challenging due to large numbers of application instances resources and users, complex and dynamic business...

View Article

Usability of Security Administration vs. Usability of End-user Security

Having recently received increasing attention, usable security is implicitly all about the end user who employs a computer system to accomplish security-unrelated business or personal goals. However,...

View Article


HOT Admin: Human, Organization, and Technology Centred Improvement of the IT...

While cryptography, access control, accountability, and other security technologies have received a great deal of attention, to our knowledge this is the first attempt to address systematically the...

View Article

Summary of the HOT Admin Proposal

View Article

Usable Security: Quo Vadis?

The presentation discusses the current state of HCISec and challanges for future research.

View Article


Studying IT Security Professionals: Research Design and Lessons Learned

The HOT Admin Field Study used qualitative methods to study information technology security administrators. Both the nature of the field and the difficulty of gaining access to subjects had...

View Article

Browsing all 9 articles
Browse latest View live




Latest Images