Integrating a Usable Security Protocol into User Authentication Services Design Process

Nonfiction, Computers, Advanced Computing, Information Technology, Networking & Communications, Computer Security, Programming, Software Development
Cover of the book Integrating a Usable Security Protocol into User Authentication Services Design Process by Christina Braz, Ahmed Seffah, Bilal Naqvi, CRC Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Christina Braz, Ahmed Seffah, Bilal Naqvi ISBN: 9780429787492
Publisher: CRC Press Publication: November 8, 2018
Imprint: Auerbach Publications Language: English
Author: Christina Braz, Ahmed Seffah, Bilal Naqvi
ISBN: 9780429787492
Publisher: CRC Press
Publication: November 8, 2018
Imprint: Auerbach Publications
Language: English

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

More books from CRC Press

Cover of the book Modern Wiring Practice by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Carpentry and Joinery Book 1 by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Health Maintenance of Cultured Fishes by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Ray Tracing from the Ground Up by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Rock Mass Response to Mining Activities by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Creating Theoretical Research Frameworks using Multiple Methods by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Foodborne Disease Handbook by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Environmental Sampling and Analysis for Technicians by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Organizational Accidents Revisited by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Non-Imaging Microwave and Millimetre-Wave Sensors for Concealed Object Detection by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Pesticide Formulation and Adjuvant Technology by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Estimating the Impacts of Urban Growth on Future Flood Risk by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Architectural Research Addressing Societal Challenges Volume 1 by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Design of Thermal Oxidation Systems for Volatile Organic Compounds by Christina Braz, Ahmed Seffah, Bilal Naqvi
Cover of the book Cockpit Monitoring and Alerting Systems by Christina Braz, Ahmed Seffah, Bilal Naqvi
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy