Integrating a usable security protocol into user authentication services design process

"There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is p...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Braz, Christina (VerfasserIn)
Weitere Verfasser: Seffah, Ahmed (VerfasserIn), Naqvi, Bilal (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: Boca Raton, London$New York CRC Press/Taylor & Francis Group, an Auerback book 2019
Schlagworte:
Online Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:"There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle"--
Beschreibung:Includes bibliographical references (pages 367-382) and index
Beschreibung:xv, 393 Seiten
Illustrationen, Diagramme
ISBN:9781138577688
978-1-138-57768-8