scispace - formally typeset
D

Diana K. Smetters

Researcher at PARC

Publications -  84
Citations -  13125

Diana K. Smetters is an academic researcher from PARC. The author has contributed to research in topics: Key (cryptography) & Public key infrastructure. The author has an hindex of 36, co-authored 84 publications receiving 12851 citations. Previous affiliations of Diana K. Smetters include Massachusetts Institute of Technology & Cisco Systems, Inc..

Papers
More filters
Journal ArticleDOI

In search of usable security: five lessons from the field

TL;DR: A real-world example providing five general lessons for usable, secure system design is provided, revealing a new system reduces the time to enroll in a secure wireless network by two orders of magnitude.
Patent

Ad hoc secure access to documents and services

TL;DR: In this paper, the first user transmits a URL token to the second user that identifies the location of the document server and the token identifier, and the second users authenticate the token against the first secure session before providing access to the document or service.
Proceedings ArticleDOI

Moving from the design of usable security technologies to the design of useful secure applications

TL;DR: This paper argues that improving the usability of security technology is only one part of the problem, and that what is missed is the need to design usable and useful systems that provide security to end-users in terms of the applications that they use and the tasks they want to achieve.
Patent

Method and apparatus for establishing and using a secure credential infrastructure

TL;DR: An instant PKI as discussed by the authors allows layman computer users to simply create, provision, and maintain secured infrastructure, which can be used in a wide variety of applications including wired and wireless networks, secure sensor networks, emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
Patent

System and method for providing secure resource management

TL;DR: In this paper, the authors propose a secure resource management system that includes a first device that creates a secure, shared resource space and a corresponding root certificate for the shared space, and the first device associates one or more resources that it can access with the shared spaces.