Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary

Integrating a usable security protocol into user authentication services design process / by Ahmed Seffah, Christina Braz, Syed Naqvi.

By: Contributor(s): Material type: TextTextPublication details: Boca Raton CRC Press 2019Edition: First editionDescription: xiii, 393 pagesISBN:
  • 9781138577688 (hardback : acidfree paper)
Subject(s): DDC classification:
  • 005.83 BRA
Summary: "There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle"--
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Home library Call number Status Date due Barcode
Book Book Dept. of Computer Science Reference Dept. of Computer Science 005.83 BRA (Browse shelf(Opens below)) Available DCS4743

Includes bibliographical references and index.

"There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle"--

There are no comments on this title.

to post a comment.