Poster: Security Design Patterns With Good Usability

被引:0
|
作者
Hof, Hans-Joachim [1 ]
Socher, Gudrun [2 ]
机构
[1] Munich Univ Appl Sci, Muse Munich IT Secur Res Grp, Lothstr 64, D-80335 Munich, Germany
[2] Munich Univ Appl Sci, Dept Comp Sci & Math, Lothstr 64, D-80335 Munich, Germany
来源
PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16) | 2016年
关键词
Usability; Security Design Patterns; Design Patterns; Usable Security;
D O I
10.1145/2939918.2942423
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This poster presents work-in-progress in the field of usable security. The usability of security mechanisms is crucial to avoid unintended misuse of security mechanisms which lowers the security level of a system. It is the goal of the work presented in this poster to identify security design patterns with good usability. Requirements for security design patterns with good usability stem from existing usable security design guidelines. A collection of security usability failures is presented as well as examples of how misuse anti-patterns can be derived from these failures. Misuse cases will be used in future work to identify security design patterns with good usability.
引用
收藏
页码:227 / 228
页数:2
相关论文
共 50 条
  • [1] Towards Identification of Patterns Aligning Security and Usability
    Naqvi, Bilal
    Porras, Jari
    Oyedeji, Shola
    Ullah, Mehar
    BEYOND INTERACTIONS, INTERACT 2019, 2020, 11930 : 121 - 132
  • [2] Integrating security and usability into the requirements and design process
    Flechais, Ivan
    Mascolo, Cecilia
    Sasse, M. Angela
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) : 12 - 26
  • [3] On the Usability of Object-Oriented Design Patterns for a Better Software Quality
    Bontchev, Boyan
    Milanova, Emanuela
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2020, 20 (04) : 36 - 54
  • [4] Usability, Security and Healthcare Systems: Design, Challenges and Perspectives
    Baklanoff, Tanya Ann
    Padath, Anish Abraham
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (06): : 366 - 376
  • [5] SecureUse: Balancing Security and Usability Within System Design
    Dutta, Saurabh
    Madnick, Stuart
    Joyce, Ger
    HCI INTERNATIONAL 2016 - POSTERS' EXTENDED ABSTRACTS, PT I, 2016, 617 : 471 - 475
  • [6] A systematic review on smart contracts security design patterns
    Azimi, Sadaf
    Golzari, Ali
    Ivaki, Naghmeh
    Laranjeiro, Nuno
    EMPIRICAL SOFTWARE ENGINEERING, 2025, 30 (03)
  • [7] Dissecting the Security and Usability Alignment in the Industry
    Naqvi, Bilal
    HUMAN-CENTERED SOFTWARE ENGINEERING (HCSE 2022), 2022, 13482 : 57 - 69
  • [8] Design Strategies to Minimize Mobile Usability Issues in Navigation Design Patterns
    Umar, Muhammad
    Hussain, Ibrar
    Mahmood, Toqeer
    Mirza, Hamid Turab
    Faisal, C. M. Nadeem
    INFORMATION, 2024, 15 (11)
  • [9] The Security-Usability Tradeoff Myth
    Sasse, M. Angela
    Smith, Matthew
    IEEE SECURITY & PRIVACY, 2016, 14 (05) : 11 - 13
  • [10] Deconstructing web experience: More than just usability and good design
    Harrison, Chandra
    Petrie, Helen
    HUMAN-COMPUTER INTERACTION, PT 4, PROCEEDINGS: HCI APPLICATIONS AND SERVICES, 2007, 4553 : 889 - +