Section 13.5. Acknowledgments


13.5. Acknowledgments

The 10 guidelines in this chapter are based on an earlier set of principles[23] developed in collaboration with Miriam Walker through a series of discussions with Norm Hardy, Mark S. Miller, Chip Morningstar, Kragen Sitaker, Marc Stiegler, and Dean Tribble. Thanks to Morgan Ames, Tyler Close, Lorrie Cranor, Paul Eykamp, Simson Garfinkel, Jeremy Goecks, Alan Karp, Linley Erin Hall, Marti Hearst, Siren Torsvik Henriksen, Rebecca Middleton, Mark S. Miller, Diana Smetters, and Marc Stiegler for their many helpful suggestions, and to David T. Wallace for his advice on illustrations.

[23] Ka-Ping Yee, "User Interaction Design for Secure Systems," in Robert Deng, Sihan Qing, Feng Bao, and Jianying Zhou (eds.), Proceedings of the 4th International Conference on Information and Communications Security, Lecture Notes in Computer Science 2513, (Heidelberg: Springer-Verlag, 2002); http://zesty.ca/sid/.



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net