{"id":"https://openalex.org/W2022302485","doi":"https://doi.org/10.1145/1655008.1655012","title":"Browser interfaces and extended validation SSL certificates","display_name":"Browser interfaces and extended validation SSL certificates","publication_year":2009,"publication_date":"2009-11-13","ids":{"openalex":"https://openalex.org/W2022302485","doi":"https://doi.org/10.1145/1655008.1655012","mag":"2022302485"},"language":"en","primary_location":{"id":"doi:10.1145/1655008.1655012","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1655008.1655012","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 ACM workshop on Cloud computing security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010995209","display_name":"Robert Biddle","orcid":"https://orcid.org/0000-0001-5971-2705"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Robert Biddle","raw_affiliation_strings":["Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011846293","display_name":"Paul C. van Oorschot","orcid":"https://orcid.org/0000-0002-5038-5370"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"P. C. van Oorschot","raw_affiliation_strings":["Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111377517","display_name":"Andrew S. Patrick","orcid":null},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Andrew S. Patrick","raw_affiliation_strings":["Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055541976","display_name":"Jennifer Sobey","orcid":null},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jennifer Sobey","raw_affiliation_strings":["Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111838467","display_name":"Tara Whalen","orcid":null},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Tara Whalen","raw_affiliation_strings":["Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5010995209"],"corresponding_institution_ids":["https://openalex.org/I67031392"],"apc_list":null,"apc_paid":null,"fwci":12.5851,"has_fulltext":false,"cited_by_count":72,"citation_normalized_percentile":{"value":0.98406821,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.809863805770874},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6424331068992615},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.6282000541687012},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.5690352320671082},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5275813341140747},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5031487345695496},{"id":"https://openalex.org/keywords/public-key-certificate","display_name":"Public key certificate","score":0.49785494804382324},{"id":"https://openalex.org/keywords/user-interface","display_name":"User interface","score":0.49259406328201294},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.4279305636882782},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3814956545829773},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.29747912287712097},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.17052549123764038},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.0847020149230957},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08056685328483582}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.809863805770874},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6424331068992615},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.6282000541687012},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.5690352320671082},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5275813341140747},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5031487345695496},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.49785494804382324},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.49259406328201294},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.4279305636882782},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3814956545829773},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.29747912287712097},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.17052549123764038},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0847020149230957},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08056685328483582},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1655008.1655012","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1655008.1655012","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 ACM workshop on Cloud computing security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1485200701","https://openalex.org/W1522768299","https://openalex.org/W1534216444","https://openalex.org/W1550000763","https://openalex.org/W1688446120","https://openalex.org/W1964146567","https://openalex.org/W1983581110","https://openalex.org/W2010608681","https://openalex.org/W2029827226","https://openalex.org/W2126458319","https://openalex.org/W2131906261","https://openalex.org/W2132156882","https://openalex.org/W2132324287","https://openalex.org/W2158419323","https://openalex.org/W2160343382","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4388829360","https://openalex.org/W4381195491","https://openalex.org/W4225555599","https://openalex.org/W1029437559","https://openalex.org/W4253144255","https://openalex.org/W4293194180","https://openalex.org/W2365438736","https://openalex.org/W2187680011","https://openalex.org/W2231252935","https://openalex.org/W2112866819"],"abstract_inverted_index":{"There":[0],"has":[1],"been":[2],"a":[3,97,126,153,161],"loss":[4],"of":[5,20,41,58,89,116,121,139,147],"confidence":[6],"in":[7,17,36,76,113,135],"the":[8,18,39,53,64,70,77,136],"security":[9,166],"provided":[10],"by":[11],"SSL":[12,27,45,49,74,150],"certificates":[13,29,50,75,151],"and":[14,92,119],"browser":[15,81],"interfaces":[16,71,138],"face":[19],"various":[21],"attacks.":[22],"As":[23],"one":[24],"response,":[25],"basic":[26],"server":[28],"are":[30],"being":[31],"demoted":[32],"to":[33,63,73,108,164],"second-class":[34],"status":[35],"conjunction":[37],"with":[38],"introduction":[40],"Extended":[42],"Validation":[43],"(EV)":[44],"certificates.":[46],"Unfortunately,":[47],"EV":[48,149],"may":[51],"complicate":[52],"already":[54],"difficult":[55],"design":[56],"challenge":[57],"effectively":[59],"conveying":[60],"certificate":[61],"information":[62],"average":[65],"user.":[66],"This":[67,142],"study":[68,99,146],"explores":[69],"related":[72],"most":[78],"widely":[79],"deployed":[80],"(Internet":[82],"Explorer":[83],"7),":[84],"proposes":[85],"an":[86],"alternative":[87,104],"set":[88],"interface":[90,105],"dialogs,":[91],"compares":[93],"their":[94],"effectiveness":[95],"through":[96],"user":[98,137],"involving":[100],"40":[101],"participants.":[102],"The":[103],"was":[106],"found":[107],"offer":[109,152],"statistically":[110],"significant":[111],"improvements":[112],"confidence,":[114],"ease":[115,120],"finding":[117],"information,":[118],"understanding.":[122],"Such":[123],"results":[124],"from":[125],"modest":[127],"re-design":[128],"effort":[129],"suggest":[130],"considerable":[131],"room":[132],"for":[133,156,167],"improvement":[134],"browsers":[140],"today.":[141],"work":[143],"motivates":[144],"further":[145,162],"whether":[148],"robust":[154],"foundation":[155],"improving":[157],"Internet":[158],"trust,":[159],"or":[160],"compromise":[163],"usable":[165],"ordinary":[168],"users.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":9},{"year":2013,"cited_by_count":9},{"year":2012,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
