000 01418cam a22002298i 4500
999 _c301882
_d301882
020 _a9781138577688 (hardback : acidfree paper)
082 0 0 _a005.83
_bBRA
100 1 _a Braz, Christina
245 1 0 _aIntegrating a usable security protocol into user authentication services design process /
_cby Ahmed Seffah, Christina Braz, Syed Naqvi.
250 _aFirst edition.
260 _aBoca Raton
_bCRC Press
_c2019
300 _axiii, 393 pages:
504 _aIncludes bibliographical references and index.
520 _a"There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle"--
650 0 _aComputers
650 0 _aComputer systems
650 0 _aComputer networks
650 0 _aIdentification.
700 1 _aBraz, Christina,
700 1 _aNaqvi, Syed,
942 _cBK