{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:06Z","timestamp":1750307406656,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,10]],"date-time":"2010-04-10T00:00:00Z","timestamp":1270857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,10]]},"DOI":"10.1145\/1753846.1753966","type":"proceedings-article","created":{"date-parts":[[2010,4,12]],"date-time":"2010-04-12T18:13:40Z","timestamp":1271096020000},"page":"3247-3252","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Making policy decisions disappear into the user's workflow"],"prefix":"10.1145","author":[{"given":"Alan H.","family":"Karp","sequence":"first","affiliation":[{"name":"Hewlett-Packard Laboratories, Palo Alto, CA, USA"}]},{"given":"Marc","family":"Stiegler","sequence":"additional","affiliation":[{"name":"Hewlett-Packard Laboratories, Palo Alto, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,4,10]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/1143120.1143124"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1518701.1519041"},{"key":"e_1_3_2_1_3_1","volume-title":"Security and Usability: Designing Secure Systems That People Can Use","author":"Cranor L. F.","year":"2005","unstructured":"Cranor , L. F. and Garfinkel , S . Security and Usability: Designing Secure Systems That People Can Use . Sebastopol, CA : O'Reilly Media , Inc., ( 2005 ) Cranor, L. F. and Garfinkel, S. Security and Usability: Designing Secure Systems That People Can Use. Sebastopol, CA: O'Reilly Media, Inc., (2005)"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/365230.365252"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1600176.1600182"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/3166.3170"},{"key":"e_1_3_2_1_7_1","volume-title":"Operating Systems Reviews, 22, #4","author":"Hardy N.","year":"1988","unstructured":"Hardy , N. , \" The Confused Deputy \" , Operating Systems Reviews, 22, #4 , 1988 Hardy, N., \"The Confused Deputy\", Operating Systems Reviews, 22, #4, 1988"},{"unstructured":"Hewlett-Packard Company http:\/\/www.hp.com\/halo\/introducing.html  Hewlett-Packard Company http:\/\/www.hp.com\/halo\/introducing.html","key":"e_1_3_2_1_8_1"},{"unstructured":"Hewlett-Packard Company Intel Yahoo! Open Cirrus https:\/\/opencirrus.org\/  Hewlett-Packard Company Intel Yahoo! Open Cirrus https:\/\/opencirrus.org\/","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_12_1","first-page":"335","volume-title":"Simple Desktop Security with Chameleon. In {3}","author":"Long C. A.","unstructured":"Long , C. A. and Moskowitz , C . Simple Desktop Security with Chameleon. In {3} pp. 335 -- 356 . Long, C. A. and Moskowitz, C. Simple Desktop Security with Chameleon. In {3} pp. 335--356."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1016\/j.ijhcs.2005.04.009"},{"unstructured":"Microsoft Corp. What's inside Live Mesh? https:\/\/www.mesh.com  Microsoft Corp. What's inside Live Mesh? https:\/\/www.mesh.com","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","first-page":"378","volume-title":"LNCS, #4886","author":"Mitchell A. S.","year":"2008","unstructured":"Mitchell , A. S. and Karp , A. H . Improving Usability by Adding Security to a Video Conferencing Collaboration System , LNCS, #4886 , pp. 378 -- 382 , 2008 . Mitchell, A. S. and Karp, A. H. Improving Usability by Adding Security to a Video Conferencing Collaboration System, LNCS, #4886, pp. 378--382, 2008."},{"key":"e_1_3_2_1_16_1","first-page":"623","volume-title":"Achieving Usable Security in Groove. In {3}","author":"Moromisato G.","unstructured":"Moromisato , G. , Boyd , P. , and Asthagiri , N . Achieving Usable Security in Groove. In {3} pp. 623 -- 636 . Moromisato, G., Boyd, P., and Asthagiri, N. Achieving Usable Security in Groove. In {3} pp. 623--636."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/1357054.1357285"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/361011.361067"},{"unstructured":"Stiegler M. A Capability Based Client: The Darpa-Browser. http:\/\/www.combex.com\/papers\/darpa-report\/darpaBrowserFinalReport.pdf (2002)  Stiegler M. A Capability Based Client: The Darpa-Browser. http:\/\/www.combex.com\/papers\/darpa-report\/darpaBrowserFinalReport.pdf (2002)","key":"e_1_3_2_1_19_1"},{"unstructured":"Yee Ka-Ping. \"Guidelines and Strategies for Secure Interaction Design.\" In {3} pp. 247--273  Yee Ka-Ping. \"Guidelines and Strategies for Secure Interaction Design.\" In {3} pp. 247--273","key":"e_1_3_2_1_21_1"}],"event":{"sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"acronym":"CHI '10","name":"CHI '10: CHI Conference on Human Factors in Computing Systems","location":"Atlanta Georgia USA"},"container-title":["CHI '10 Extended Abstracts on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1753846.1753966","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1753846.1753966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:28Z","timestamp":1750246768000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1753846.1753966"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,10]]},"references-count":18,"alternative-id":["10.1145\/1753846.1753966","10.1145\/1753846"],"URL":"https:\/\/doi.org\/10.1145\/1753846.1753966","relation":{},"subject":[],"published":{"date-parts":[[2010,4,10]]},"assertion":[{"value":"2010-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}