Software products evaluation system: quality models, metrics and processes-International Standards and Japanese practice, Information and Software Technology, vol.38, pp.145-154, 1996. ,
Formal definitions for usable access control rule sets from goals to metrics, Proceedings of the Ninth Symposium on Usable Privacy and Security ACM, vol.2, 2013. ,
Integrating a Usable Security Protocol into User Authentication Services Design Process, 2018. ,
The psychology of human-computer interaction, 1983. ,
Security and usability: designing secure systems that people can use, 2005. ,
Choose Your Own Authentication, Proceedings of the 2015 New Security Paradigms Workshop ACM, pp.1-15, 2015. ,
Usable-Security Evaluation, Human Aspects of Information Security, Privacy, and Trust Springer, pp.335-346, 2015. ,
Choice-based authentication: A usable-security approach, pp.114-124, 2014. ,
CASA: context-aware scalable authentication, Proceedings of the Ninth Symposium on Usable Privacy and Security ACM, p.3, 2013. ,
ISO/IEC 27000: Information technology --Security techniques --Information security management systems --Overview and vocabulary. International Organization for Standardization, 2014. ,
Usability and privacy in identity management architectures, Proceedings of the fifth Australasian symposium on ACSW frontiers, vol.68, pp.143-152, 2007. ,
Security and usability: Analysis and evaluation, Availability, Reliability, and Security, 2010. ARES'10 International Conference on IEEE, pp.275-282, 2010. ,
Community cloud computing, Cloud Computing Springer, pp.472-484, 2009. ,
An improved mutual authentication framework for cloud computing, International Journal of Computer Applications, vol.52, p.5, 2012. ,
Security & Human Factors, 2000. ,
A design science research methodology for information systems research, Journal of management information systems, vol.24, pp.45-77, 2007. ,
Survey and analysis on security requirements engineering, Computers & Electrical Engineering, vol.38, pp.1785-1797, 2012. ,
Usability measurement and metrics: A consolidated model, Software Quality Journal, vol.14, pp.159-178, 2006. ,
The 10 deadly sins of information security management, Computers & Security, vol.23, pp.371-376, 2004. ,
Toward a secure and usable cloud-based password manager for web browsers, Computers & Security, vol.46, pp.32-47, 2014. ,
Finding and resolving security mis-usability with mis-usability cases, Requirement Engineering, vol.21, pp.209-223, 2016. ,