Author of the publication

Expressions of expertness: the virtuous circle of natural language for access control policy specification.

, , , and . SOUPS, page 77-88. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Great Authentication Fatigue - And How to Overcome It., , , and . HCI (19), volume 8528 of Lecture Notes in Computer Science, page 228-239. Springer, (2014)Designing and evaluating usable security and privacy technology., , and . SOUPS, ACM, (2009)GazeSpace: eye gaze controlled content spaces., , and . BCS HCI (2), page 55-58. BCS, (2007)Safe and sound: a safety-critical approach to security., and . NSPW, page 41-50. ACM, (2001)Do you know dis?: a user study of a knowledge discovery tool for organizations., , , and . CHI, page 2887-2896. ACM, (2011)Eliciting and describing users' models of computer systems.. University of Birmingham, UK, (1997)British Library, EThOS.Listen to Your Heart Rate: Counting the Cost of Media Quality., and . IWAI, volume 1814 of Lecture Notes in Computer Science, page 9-20. Springer, (1999)To catch a thief - you need at least 8 frames per second: the impact of frame rates on user performance in a CCTV detection task., and . ACM Multimedia, page 941-944. ACM, (2008)"Technology Should Be Smarter Than This!": A Vision for Overcoming the Great Authentication Fatigue.. Secure Data Management, volume 8425 of Lecture Notes in Computer Science, page 33-36. Springer, (2013)Information security as organizational power: A framework for re-thinking security policies., and . STAST, page 9-16. IEEE, (2011)