Integrating a Usable Security Protocol into User Authentication Services Design Process Integrating a Usable Security Protocol into User Authentication Services Design Process

Integrating a Usable Security Protocol into User Authentication Services Design Process

Christina Braz and Others
    • $82.99
    • $82.99

Publisher Description

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

GENRE
Computing & Internet
RELEASED
2018
8 November
LANGUAGE
EN
English
LENGTH
394
Pages
PUBLISHER
CRC Press
SELLER
Taylor & Francis Group
SIZE
18.6
MB

More Books Like This

Human Aspects of Information Security, Privacy, and Trust Human Aspects of Information Security, Privacy, and Trust
2016
HCI for Cybersecurity, Privacy and Trust HCI for Cybersecurity, Privacy and Trust
2019
Human Aspects of Information Security, Privacy, and Trust Human Aspects of Information Security, Privacy, and Trust
2015
Emerging Technologies for Authorization and Authentication Emerging Technologies for Authorization and Authentication
2018
Trust, Privacy and Security in Digital Business Trust, Privacy and Security in Digital Business
2017
Information Systems Security and Privacy Information Systems Security and Privacy
2019