Investigating System Operators' Perspective on Security Misconfigurations. Dietrich, C., Krombholz, K., Borgolte, K., & Fiebig, T. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, of CCS '18, pages 1272–1289, New York, NY, USA, 2018. ACM.
Paper doi bibtex @inproceedings{dietrich_investigating_2018,
address = {New York, NY, USA},
series = {{CCS} '18},
title = {Investigating {System} {Operators}' {Perspective} on {Security} {Misconfigurations}},
isbn = {978-1-4503-5693-0},
url = {http://doi.acm.org/10.1145/3243734.3243794},
doi = {10.1145/3243734.3243794},
booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} {Conference} on {Computer} and {Communications} {Security}},
publisher = {ACM},
author = {Dietrich, Constanze and Krombholz, Katharina and Borgolte, Kevin and Fiebig, Tobias},
year = {2018},
keywords = {administrators, computer systems, human factors, misconfigurations, operators, security, system operations, vulnerabilities},
pages = {1272--1289},
}
Downloads: 0
{"_id":"4swujSHwS4mdEeqai","bibbaseid":"dietrich-krombholz-borgolte-fiebig-investigatingsystemoperatorsperspectiveonsecuritymisconfigurations-2018","author_short":["Dietrich, C.","Krombholz, K.","Borgolte, K.","Fiebig, T."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","address":"New York, NY, USA","series":"CCS '18","title":"Investigating System Operators' Perspective on Security Misconfigurations","isbn":"978-1-4503-5693-0","url":"http://doi.acm.org/10.1145/3243734.3243794","doi":"10.1145/3243734.3243794","booktitle":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","publisher":"ACM","author":[{"propositions":[],"lastnames":["Dietrich"],"firstnames":["Constanze"],"suffixes":[]},{"propositions":[],"lastnames":["Krombholz"],"firstnames":["Katharina"],"suffixes":[]},{"propositions":[],"lastnames":["Borgolte"],"firstnames":["Kevin"],"suffixes":[]},{"propositions":[],"lastnames":["Fiebig"],"firstnames":["Tobias"],"suffixes":[]}],"year":"2018","keywords":"administrators, computer systems, human factors, misconfigurations, operators, security, system operations, vulnerabilities","pages":"1272–1289","bibtex":"@inproceedings{dietrich_investigating_2018,\n\taddress = {New York, NY, USA},\n\tseries = {{CCS} '18},\n\ttitle = {Investigating {System} {Operators}' {Perspective} on {Security} {Misconfigurations}},\n\tisbn = {978-1-4503-5693-0},\n\turl = {http://doi.acm.org/10.1145/3243734.3243794},\n\tdoi = {10.1145/3243734.3243794},\n\tbooktitle = {Proceedings of the 2018 {ACM} {SIGSAC} {Conference} on {Computer} and {Communications} {Security}},\n\tpublisher = {ACM},\n\tauthor = {Dietrich, Constanze and Krombholz, Katharina and Borgolte, Kevin and Fiebig, Tobias},\n\tyear = {2018},\n\tkeywords = {administrators, computer systems, human factors, misconfigurations, operators, security, system operations, vulnerabilities},\n\tpages = {1272--1289},\n}\n\n\n\n","author_short":["Dietrich, C.","Krombholz, K.","Borgolte, K.","Fiebig, T."],"key":"dietrich_investigating_2018-1","id":"dietrich_investigating_2018-1","bibbaseid":"dietrich-krombholz-borgolte-fiebig-investigatingsystemoperatorsperspectiveonsecuritymisconfigurations-2018","role":"author","urls":{"Paper":"http://doi.acm.org/10.1145/3243734.3243794"},"keyword":["administrators","computer systems","human factors","misconfigurations","operators","security","system operations","vulnerabilities"],"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/zotero/hweffers","dataSources":["deqdwEwth2mY6hYZF"],"keywords":["administrators","computer systems","human factors","misconfigurations","operators","security","system operations","vulnerabilities"],"search_terms":["investigating","system","operators","perspective","security","misconfigurations","dietrich","krombholz","borgolte","fiebig"],"title":"Investigating System Operators' Perspective on Security Misconfigurations","year":2018}