2002
DOI: 10.1007/3-540-36159-6_24
|View full text |Cite
|
Sign up to set email alerts
|

User Interaction Design for Secure Systems

Abstract: The security of any computer system that is configured and operated by human beings critically depends on the information conveyed by the user interface, the decisions of the computer users, and the interpretation of their actions. We establish some starting points for reasoning about security from a user-centred point of view, by modelling a system in terms of actors and actions and introducing the concept of the subjective actor-ability state. We identify ten key principles for user interaction design in sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
96
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 116 publications
(96 citation statements)
references
References 16 publications
0
96
0
Order By: Relevance
“…The user should have the ability to express these wishes in a usable way through a graphical user interface. Recent work shows that this can be done [Yee02]. For example, selecting a file from a browser window gives a capability to the application: it both designates the file and gives authority to perform an operation (such as an edit) on the file.…”
Section: Environment Interactionmentioning
confidence: 99%
See 1 more Smart Citation
“…The user should have the ability to express these wishes in a usable way through a graphical user interface. Recent work shows that this can be done [Yee02]. For example, selecting a file from a browser window gives a capability to the application: it both designates the file and gives authority to perform an operation (such as an edit) on the file.…”
Section: Environment Interactionmentioning
confidence: 99%
“…QTk builds on the insecure module Tk and augments that functionality instead of restricting it. QTk has to be modified so that it satisfies the principles enunciated in [Yee02] and implemented in CapDesk.…”
Section: Environment Interactionmentioning
confidence: 99%
“…Work we found useful to our experiment includes research on principles for secure interaction design [47], common problems in humancomputer dialogue design [27], user tolerance of security delays [16], treating human attention as a scarce resource when to delegate tasks to users [6], stopping users from installing potentially harmful programs [21], and getting proper user consent [7].…”
Section: Related Workmentioning
confidence: 99%
“…[8,4,16], which deal with security and usability. Also more traditional usability guidelines such as [11,13, lOj must be considered.…”
Section: Summary and Recommendationsmentioning
confidence: 99%