SOUPS 2007:
Pittsburgh,
PA,
USA
Lorrie Faith Cranor (Ed.):
Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007.
ACM International Conference Proceeding Series 229 ACM 2007, ISBN 978-1-59593-801-5
Passwords
Privacy and access control
- Carlos Jensen, Chandan Sarkar, Christian Jensen, Colin Potts:
Tracking website data-collection and privacy practices with the iWatch web crawler.
29-40
- Jeremy Clark, Paul C. van Oorschot, Carlisle Adams:
Usability of anonymous web browsing: an examination of Tor interfaces and deployability.
41-51
- Balachander Krishnamurthy, Delfina Malandrino, Craig E. Wills:
Measuring privacy loss and the impact of privacy protection in web browsing.
52-63
- Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea:
Lessons learned from the deployment of a smartphone-based access-control system.
64-75
Training and such
- José Carlos Brustoloni, Ricardo Villamarín-Salomón:
Improving security decisions with polymorphic and audited dialogs.
76-85
- Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge:
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish.
88-99
- David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels, Brian D. Fisher:
Towards understanding IT security professionals and their tools.
100-111
SOUPS du jour
Posters
- Rajah James, Woo Tae Kim, Aleecia M. McDonald, Robert McGuire:
A usability evaluation of a home monitoring system.
143-144
- John Bethencourt, Wai Yong Low, Isaac Simmons, Matthew Williamson:
Establishing darknet connections: an evaluation of usability and security.
145-146
- Johnny Lim:
Defeat spyware with anti-screen capture technology using visual persistence.
147-148
- Rodrigo Werlinger, David Botta, Konstantin Beznosov:
Detecting, analyzing and responding to security incidents: a qualitative analysis.
149-150
- Alain Forget, Sonia Chiasson, Robert Biddle:
Helping users create better passwords: is this the right approach?
151-152
- Rosa R. Heckle, Andrew S. Patrick, Ant Ozok:
Perception and acceptance of fingerprint biometric technology.
153-154
- Andreas P. Heiner, N. Asokan:
Secure software installation in a mobile environment.
155-156
- Katherine Strater, Heather Richter:
Examining privacy and disclosure in a social networking community.
157-158
- Robert L. Marchant:
A survey of privacy concerns with dynamic collaborator discovery capabilities.
159-160
- Di Lin, Paul Dunphy, Patrick Olivier, Jeff Yan:
Graphical passwords & qualitative spatial relations.
161-162
- Matthew Edman, Justin Hipple:
Vidalia: towards a usable Tor GUI.
163-164
- Paul Dunphy, Jeff Yan:
Is FacePIN secure and usable?
165-166
- Joshua B. Gross, Mary Beth Rosson:
End user concern about security and privacy threats.
167-168
- Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith:
TwoKind authentication: usable authenticators for untrustworthy environments.
169-170
- Sara Motahari, Constantine Manikopoulos, Starr Roxanne Hiltz, Quentin Jones:
Seven privacy worries in ubiquitous social computing.
171-172
- Rosa R. Heckle, Wayne G. Lutters:
Privacy implications for single sign-on authentication in a hospital environment.
173-174
Copyright © Mon Mar 15 03:54:58 2010
by Michael Ley (ley@uni-trier.de)