Steffen Bartsch

According to our database1, Steffen Bartsch authored at least 22 papers between 2008 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Policy override in practice: model, evaluation, and decision support.
Secur. Commun. Networks, 2014

Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
Comput. und Recht, 2014

Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

2013
Mental Models of Verifiability in Voting.
Proceedings of the E-Voting and Identify - 4th International Conference, 2013

Contextualized Web Warnings, and How They Cause Distrust.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Adopting the CMU/APWG Anti-phishing Landing Page Idea for Germany.
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013

Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

Contextualized Security Interventions in Password Transmission Scenarios.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

How Users Bypass Access Control - And Why: The Impact Of Authorization Problems On Individuals And The Organization.
Proceedings of the 21st European Conference on Information Systems, 2013

The Transitivity-of-Trust Problem in Android Application Interaction.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Broadening the scope of security usability from the individual to the organizational: participation and interaction for effective, efficient, and agile authorization.
PhD thesis, 2012

The Transitivity of Trust Problem in the Interaction of Android Applications
CoRR, 2012

Guiding decisions on authorization policies: a participatory approach to decision support.
Proceedings of the ACM Symposium on Applied Computing, 2012

Benutzbare Sicherheit für wirksame Berechtigungen in Organisationen.
Proceedings of the Ausgezeichnete Informatikdissertationen 2012, 2012

2011
Exploring twisted paths: Analyzing authorization processes in organizations.
Proceedings of the 5th International Conference on Network and System Security, 2011

Authorization Enforcement Usability Case Study.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Practitioners' Perspectives on Security in Agile Development.
Proceedings of the Sixth International Conference on Availability, 2011

2010
A calculus for the qualitative risk assessment of policy override authorization.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

Supporting Authorization Policy Modification in Agile Development of Web Applications.
Proceedings of the ARES 2010, 2010

2008
Supporting Agile Development of Authorization Rules for SME Applications.
Proceedings of the Collaborative Computing: Networking, 2008


  Loading...