Kami Vaniea
Kami Vaniea
The University of Edinburgh School of Informatics
Geverifieerd e-mailadres voor inf.ed.ac.uk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1452010
Betrayed by updates: how negative experiences affect future security
KE Vaniea, E Rader, R Wash
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1032014
User-controllable security and privacy for pervasive computing
J Cornwell, I Fette, G Hsieh, M Prabaker, J Rao, K Tang, K Vaniea, ...
Eighth IEEE Workshop on Mobile Computing Systems and Applications, 14-19, 2007
832007
Real life challenges in access-control management
L Bauer, LF Cranor, RW Reeder, MK Reiter, K Vaniea
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
822009
Lessons learned from the deployment of a smartphone-based access-control system
L Bauer, LF Cranor, MK Reiter, K Vaniea
Proceedings of the 3rd Symposium on Usable Privacy and Security, 64-75, 2007
772007
A user study of policy creation in a flexible access-control system
L Bauer, LF Cranor, RW Reeder, MK Reiter, K Vaniea
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
692008
Out of the loop: How automated software updates cause unintended security consequences
R Wash, E Rader, K Vaniea, M Rizor
10th Symposium On Usable Privacy and Security ({SOUPS} 2014), 89-104, 2014
662014
Tales of Software Updates: The process of updating software
K Vaniea, Y Rashidi
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2016
532016
More than skin deep: measuring effects of the underlying model on access-control system usability
RW Reeder, L Bauer, LF Cranor, MK Reiter, K Vaniea
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
392011
Debunking security-usability tradeoff myths
MA Sasse, M Smith, C Herley, H Lipford, K Vaniea
IEEE Security & Privacy 14 (5), 33-39, 2016
282016
Out of sight, out of mind: Effects of displaying access-control information near the item it controls
K Vaniea, L Bauer, LF Cranor, MK Reiter
2012 Tenth Annual International Conference on Privacy, Security and Trust …, 2012
262012
Access control policy analysis and visualization tools for security professionals
K Vaniea, Q Ni, L Cranor, E Bertino
SOUPS Workshop (USM), 7-15, 2008
262008
Evaluating assistance of natural language policy authoring
K Vaniea, CM Karat, JB Gross, J Karat, C Brodie
Proceedings of the 4th symposium on Usable privacy and security, 65-73, 2008
242008
Was my message read? Privacy and signaling on Facebook messenger
R Hoyle, S Das, A Kapadia, AJ Lee, K Vaniea
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
222017
Understanding Saudis’ privacy concerns when using WhatsApp
Y Rashidi, K Vaniea, LJ Camp
Proceedings of the Workshop on Usable Security (USEC’16), 1-8, 2016
182016
A Survey on Developer-Centred Security
M Tahaei, K Vaniea
4th European Workshop on Usable Security, 2019
92019
Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks
R Hoyle, S Das, A Kapadia, AJ Lee, K Vaniea
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative …, 2017
92017
Comparing access-control technologies: A study of keys and smartphones
L Bauer, LF Cranor, RW Reeder, MK Reiter, K Vaniea
92007
Human-computer interaction
R Rada
Interactive Media, 12-20, 1995
81995
Functionality for sharing items using recipient-specific access codes
SE Schechter, KE Vaniea, A Forget
US Patent 8,930,469, 2015
62015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20