W3C home > Mailing lists > Public > public-usable-authentication@w3.org > June 2006

SOUPS advance program

From: Lorrie Cranor <lorrie+@cs.cmu.edu>
Date: Fri, 9 Jun 2006 20:16:47 -0400
Message-Id: <F80F96D6-EFB2-4E1D-BD67-76423F665D2E@cs.cmu.edu>
To: public-usable-authentication@w3.org

The Symposium On Usable Privacy and Security (SOUPS)
will be held July 12-14 at Carnegie Mellon University in
Pittsburgh, PA. The program includes a Security User Studies Workshop
and poster session on July 12, and technical paper sessions on July
13 and 14. The conference dinner will be held at the Carnegie Museum
of Natural History. There are a number of papers and posters
related to usable authentication. And we are planning a panel on
combating phishing.

For details see http://cups.cs.cmu.edu/soups/

The list of technical papers appears below. For the complete schedule,
see the SOUPS web site (full papers will be posted there within the  
next few weeks).

Password Management, Mnemonics, and Mother's Maiden Names

PASSPET: CONVENIENT PASSWORD MANAGEMENT AND PHISHING PROTECTION
Ka-Ping Yee, Kragen Sitaker

PASSWORD MANAGEMENT STRATEGIES FOR ONLINE ACCOUNTS
Shirley Gaw, Edward W. Felten

A COMPARISON OF PERCEIVED AND REAL SHOULDER-SURFING RISKS BETWEEN
ALPHANUMERIC AND GRAPHICAL PASSWORDS
Furkan Tari, A. Ant Ozok, Stephen H. Holden

HUMAN SELECTION OF MNEMONIC PHRASE-BASED PASSWORDS
Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor


Intelligible Access Control

ALIGNING USABILITY AND SECURITY-A USABILITY STUDY OF POLARIS
DeWitt, Alex J. Kuljis, Jasna

AN EMPIRICAL STUDY OF NATURAL LANGUAGE PARSING OF PRIVACY POLICY RULES
USING THE SPARCLE POLICY WORKBENCH
Carolyn Brodie, Clare-Marie Karat, and John Karat

INTENTIONAL ACCESS MANAGEMENT: MAKING ACCESS CONTROL USABLE FOR
END-USERS
Xiang Cao and Lee Iverson


Risk Transparency

PRIVACY AND SECURITY THREAT ANALYSIS OF THE FEDERAL EMPLOYEE PERSONAL
IDENTITY VERIFICATION (PIV) PROGRAM
Paul A. Karger

PROTECTING DOMESTIC POWERLINE COMMUNICATIONS
Richard Newman, Sherman Gavette, Larry Yonge, Ross Anderson

POWER STRIPS, PROPHYLACTICS, AND PRIVACY, OH MY!
Julia Gideon, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti

SEEING FURTHER: EXTENDING VISUALIZATION AS A BASIS FOR USABLE SECURITY
Jennifer Rode, Carolina Johansson, Paul DiGioia, Roberto Silva Filho,
Kari Nies, David Nguyen, Jie Ren, Paul Dourish, and David Redmiles


Catching Phish

DECISION STRATEGIES AND SUSCEPTIBILITY TO PHISHING
Julie S. Downs, Mandy Holbrook, Lorrie Faith Cranor

THE METHODOLOGY AND AN APPLICATION TO FIGHT AGAINST UNICODE ATTACKS
Anthony Y. Fu, Xiaotie Deng, Wenyin Liu, Greg Little

WEB WALLET: PREVENTING PHISHING ATTACKS BY REVEALING USER INTENTIONS
Min Wu, Robert C. Miller, Greg Little
Received on Saturday, 10 June 2006 00:17:00 UTC

This archive was generated by hypermail 2.3.1 : Tuesday, 6 January 2015 19:53:15 UTC