Get Free Shipping on orders over $79
Integrating a Usable Security Protocol into User Authentication Services Design Process - Christina Braz

Integrating a Usable Security Protocol into User Authentication Services Design Process

By: Christina Braz, Ahmed Seffah, Bilal Naqvi

eText | 8 November 2018 | Edition Number 1

At a Glance

eText


$93.50

or 4 interest-free payments of $23.38 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

on
Desktop
Tablet
Mobile

Other Editions and Formats

Paperback

Published: 30th September 2020

More in Computer Science

Amazon.com : Get Big Fast - Robert Spector

eBOOK

ReFormat : Windows 11 - Adam Natad

eBOOK

AI-Powered Search - Trey Grainger

eBOOK