{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T15:25:28Z","timestamp":1720625128634},"reference-count":21,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2007,7,1]],"date-time":"2007-07-01T00:00:00Z","timestamp":1183248000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":2220,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1016\/j.entcs.2007.01.059","type":"journal-article","created":{"date-parts":[[2007,6,30]],"date-time":"2007-06-30T11:20:29Z","timestamp":1183202429000},"page":"21-38","source":"Crossref","is-referenced-by-count":4,"special_numbering":"C","title":["Detecting Cognitive Causes of Confidentiality Leaks"],"prefix":"10.1016","volume":"183","author":[{"given":"R.","family":"Ruk\u0161\u0117nas","sequence":"first","affiliation":[]},{"given":"P.","family":"Curzon","sequence":"additional","affiliation":[]},{"given":"A.","family":"Blandford","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"12","key":"10.1016\/j.entcs.2007.01.059_bib001","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/322796.322806","article-title":"Users are not the enemy","volume":"42","author":"Adams","year":"1999","journal-title":"CACM"},{"key":"10.1016\/j.entcs.2007.01.059_bib002","series-title":"Proc. ICFEM 2006","first-page":"55","article-title":"A method for formalizing, analyzing, and verifying secure user interfaces","volume":"vol. 4260","author":"Beckert","year":"2006"},{"key":"10.1016\/j.entcs.2007.01.059_bib003","doi-asserted-by":"crossref","unstructured":"Bell, D.E., and L.J. La Padula, Secure computer system: Unified exposition and Multics interpretation, Tech. Rep. MTR-2997, MITRE Corp., MA, 1976","DOI":"10.21236\/ADA023588"},{"issue":"1","key":"10.1016\/j.entcs.2007.01.059_bib004","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1006\/ijhc.2002.1013","article-title":"A case study on integrating contextual information with usability evaluation","volume":"57","author":"Blandford","year":"2002","journal-title":"Int. J. Human-Computer Studies"},{"key":"10.1016\/j.entcs.2007.01.059_bib005","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s001650070021","article-title":"Demonstrating the cognitive plausibility of interactive systems","volume":"12","author":"Butterworth","year":"2000","journal-title":"Form. Asp. Computing"},{"issue":"1","key":"10.1016\/j.entcs.2007.01.059_bib006","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1207\/s15516709cog2101_2","article-title":"A working memory model of a common procedural error","volume":"21","author":"Byrne","year":"1997","journal-title":"Cognitive Science"},{"key":"10.1016\/j.entcs.2007.01.059_bib007","doi-asserted-by":"crossref","unstructured":"Cerone, A., P.A. Lindsay, and S. Connelly, Formal analysis of human-computer interaction using model-checking, in: Proc. SEFM 2005, IEEE Press, 352\u2013362","DOI":"10.1109\/SEFM.2005.19"},{"key":"10.1016\/j.entcs.2007.01.059_bib008","series-title":"Proc. EHCI 2001","first-page":"57","article-title":"Detecting multiple classes of user errors","volume":"vol. 2254","author":"Curzon","year":"2001"},{"issue":"7","key":"10.1016\/j.entcs.2007.01.059_bib009","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1145\/359636.359712","article-title":"Certification of programs for secure information flow","volume":"20","author":"Denning","year":"1977","journal-title":"CACM"},{"key":"10.1016\/j.entcs.2007.01.059_bib010","series-title":"Proc. IEEE Symp. on Security and Privacy","first-page":"11","article-title":"Security policies and security models","author":"Goguen","year":"1982"},{"key":"10.1016\/j.entcs.2007.01.059_bib011","series-title":"Cognitive Reliability and Error Analysis Method","author":"Hollnagel","year":"1998"},{"issue":"4","key":"10.1016\/j.entcs.2007.01.059_bib012","first-page":"320","article-title":"The GOMS family of user interface analysis techniques: Comparison and contrast","volume":"3","author":"John","year":"1996","journal-title":"ACM Trans. CHI"},{"key":"10.1016\/j.entcs.2007.01.059_bib013","series-title":"Proc. ICICS 2002","first-page":"278","article-title":"User interaction design for secure systems","volume":"vol. 2513","author":"Ka-Ping","year":"2002"},{"key":"10.1016\/j.entcs.2007.01.059_bib014","series-title":"Computer Aided Verification: CAV 2004","first-page":"496","article-title":"SAL 2","volume":"vol. 3114","author":"de Moura","year":"2004"},{"key":"10.1016\/j.entcs.2007.01.059_bib015","doi-asserted-by":"crossref","unstructured":"Myers, A.C., JFlow: Practical mostly-static information flow control, in: Proc. of ACM Symposium on Principles of Programming Languages, 1999, 228\u2013241","DOI":"10.1145\/292540.292561"},{"key":"10.1016\/j.entcs.2007.01.059_bib016","series-title":"Unified Theories of Cognition","author":"Newell","year":"1990"},{"key":"10.1016\/j.entcs.2007.01.059_bib017","series-title":"Proc. DSVIS 2006","first-page":"123","article-title":"Formal modelling of cognitive interpretation","volume":"vol. 4323","author":"Ruk\u0161 \u0117nas","year":"2007"},{"key":"10.1016\/j.entcs.2007.01.059_bib018","doi-asserted-by":"crossref","DOI":"10.1016\/S1571-0661(04)80891-0","article-title":"Analyzing cockpit interfaces using formal methods","volume":"43","author":"Rushby","year":"2001","journal-title":"Electronic Notes in Theoretical Computer Science"},{"issue":"1","key":"10.1016\/j.entcs.2007.01.059_bib019","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSAC.2002.806121","article-title":"Language-based information-flow security","volume":"21","author":"Sabelfeld","year":"2003","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"10.1016\/j.entcs.2007.01.059_bib020","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","article-title":"A sound type system for secure flow analysis","volume":"4","author":"Volpano","year":"1996","journal-title":"Journal of Computer Security"},{"key":"10.1016\/j.entcs.2007.01.059_bib021","series-title":"Proc. ACSAC 2005","first-page":"187","article-title":"User-centered security: Stepping up to the grand challenge","author":"Zurko","year":"2005"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066107004264?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066107004264?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T23:51:55Z","timestamp":1556581915000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066107004264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":21,"alternative-id":["S1571066107004264"],"URL":"https:\/\/doi.org\/10.1016\/j.entcs.2007.01.059","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2007,7]]}}}