![]() |
![]() |
Your cart is empty |
||
Showing 1 - 2 of 2 matches in All Departments
There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.
There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.
|
![]() ![]() You may like...
The Constitution of the United States…
United States Of America
Hardcover
R426
Discovery Miles 4 260
Advanced Introduction to Children's…
Gamze Erdem Turkelli, Wouter Vandenhole
Paperback
R605
Discovery Miles 6 050
An Introduction to Fundamental Rights in…
Alessandra Facchi, Silvia Falcetta, …
Paperback
R861
Discovery Miles 8 610
|