Usability and Security Go Together: A Case Study on Database

被引:5
作者
Wang, Yong [1 ]
Rawal, Bharat [2 ]
Duan, Qiang [2 ]
Zhang, Ping [1 ]
机构
[1] Alcorn State Univ, Dept Comp Sci & Math, Lorman, MS 39096 USA
[2] Penn State Univ, Informat Sci & Technol, Abington, PA 19001 USA
来源
2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM) | 2017年
关键词
usability; security; go together; database;
D O I
10.1109/ICRTCCM.2017.86
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
in this paper, we review security and usability scenarios. We propose security enhancement without losing usability. We apply this approach to popular application systems in the database. Specifically, we analyze database security in access control, auditing, authentication, encryption, integrity control, and backups. Finally, we present our recommendations for system security and usability to go together.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 28 条
[1]  
[Anonymous], INT J ADV INTELLIGEN
[2]  
Bourimi M., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P1364, DOI 10.1109/PASSAT/SocialCom.2011.49
[3]   User interface design affects security: patterns in click-based graphical passwords [J].
Chiasson, Sonia ;
Forget, Alain ;
Biddle, Robert ;
van Oorschot, P. C. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (06) :387-398
[4]   Better Together: Usability and Security Go Hand in Hand [J].
Cranor, Lorrie Faith ;
Buchler, Norbou .
IEEE SECURITY & PRIVACY, 2014, 12 (06) :89-93
[5]   The seven flaws of identity management - Usability and security challenges [J].
Dhamija, Rachna ;
Dusseault, Lisa .
IEEE SECURITY & PRIVACY, 2008, 6 (02) :24-29
[6]   User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking [J].
Gunson, Nancie ;
Marshall, Diarmid ;
Morton, Hazel ;
Jack, Mervyn .
COMPUTERS & SECURITY, 2011, 30 (04) :208-220
[7]   Cloud identity management security issues & solutions: a taxonomy [J].
Habiba, Umme ;
Masood, Rahat ;
Shibli, Muhammad Awais ;
Niazi, Muaz A. .
COMPLEX ADAPTIVE SYSTEMS MODELING, 2014, 2
[8]  
Kainda R., 2010, SECURITY USABILITY A
[9]  
Mayer P, 2014, LECT NOTES COMPUT SC, V8880, P204, DOI 10.1007/978-3-319-13841-1_12
[10]  
Mihajlov M., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P332, DOI 10.1109/ICNSS.2011.6060025