There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation ...
Read More
There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.
Read Less
Add this copy of Integrating a Usable Security Protocol Into User to cart. $41.58, good condition, Sold by ThriftBooks-Atlanta rated 5.0 out of 5 stars, ships from Austell, GA, UNITED STATES, published 2020 by Auerbach Publications.
Add this copy of Integrating a Usable Security Protocol into User to cart. $53.53, new condition, Sold by Ingram Customer Returns Center rated 5.0 out of 5 stars, ships from NV, USA, published 2020 by CRC Press.
Add this copy of Integrating a Usable Security Protocol into User to cart. $74.08, new condition, Sold by Booksplease rated 4.0 out of 5 stars, ships from Southport, MERSEYSIDE, UNITED KINGDOM, published 2020 by CRC Press.
Add this copy of Integrating a Usable Security Protocol into User to cart. $77.91, new condition, Sold by Ria Christie Books rated 4.0 out of 5 stars, ships from Uxbridge, MIDDLESEX, UNITED KINGDOM, published 2020 by CRC Press.
Add this copy of Integrating a Usable Security Protocol Into User to cart. $98.83, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2020 by Auerbach Publications.
Add this copy of Integrating a Usable Security Protocol Into User to cart. $135.66, new condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2020 by Auerbach Publications.