Poster: Security Design Patterns With Good Usability

被引:0
|
作者
Hof, Hans-Joachim [1 ]
Socher, Gudrun [2 ]
机构
[1] Munich Univ Appl Sci, Muse Munich IT Secur Res Grp, Lothstr 64, D-80335 Munich, Germany
[2] Munich Univ Appl Sci, Dept Comp Sci & Math, Lothstr 64, D-80335 Munich, Germany
来源
PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16) | 2016年
关键词
Usability; Security Design Patterns; Design Patterns; Usable Security;
D O I
10.1145/2939918.2942423
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This poster presents work-in-progress in the field of usable security. The usability of security mechanisms is crucial to avoid unintended misuse of security mechanisms which lowers the security level of a system. It is the goal of the work presented in this poster to identify security design patterns with good usability. Requirements for security design patterns with good usability stem from existing usable security design guidelines. A collection of security usability failures is presented as well as examples of how misuse anti-patterns can be derived from these failures. Misuse cases will be used in future work to identify security design patterns with good usability.
引用
收藏
页码:227 / 228
页数:2
相关论文
共 50 条
  • [21] Comparative Analysis of Usability of Data Entry Design Patterns for Mobile Applications
    Myka, Jakub
    Indyka-Piasecka, Agnieszka
    Telec, Zbigniew
    Trawinski, Bogdan
    Dac, Hien Cao
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2019, PT I, 2019, 11431 : 737 - 750
  • [22] Usability versus security of authentication
    Hub, Miloslav
    Capek, Jan
    Myskova, Renata
    Roudny, Radim
    COMMUNICATION AND MANAGEMENT IN TECHNOLOGICAL INNOVATION AND ACADEMIC GLOBALIZATION, 2010, : 34 - 38
  • [23] Security and Usability: Analysis and Evaluation
    Kainda, Ronald
    Flechais, Ivan
    Roscoe, A. W.
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 275 - 282
  • [24] Quantifying Usability and Security in Authentication
    Mihajlov, Martin
    Blazic, Borka Jerman
    Josimovski, Saso
    2011 35TH IEEE ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2011, : 626 - 629
  • [25] More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication
    Wiefling, Stephan
    Duermuth, Markus
    Lo Iacono, Luigi
    36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 203 - 218
  • [26] Poster: Password Entering and Transmission Security
    Canova, Gamze
    Volkamer, Melanie
    Weiler, Simon
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1418 - 1420
  • [27] Axiomatic Design/Design Patterns Mashup: Part 2 (Cyber Security)
    Thomas, John
    Mantri, Pam
    9TH INTERNATIONAL CONFERENCE ON AXIOMATIC DESIGN (ICAD 2015), 2015, 34 : 275 - 282
  • [28] Study of Usability of Security and Privacy in Context Aware Mobile Applications
    Pattan, Neha
    Madamanchi, Deepthi
    MOBILE COMPUTING, APPLICATIONS AND SERVICES, 2010, 35 : 326 - 330
  • [29] Mechanisms for increasing the usability of grid security
    Beckles, B
    Welch, V
    Basney, J
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) : 74 - 101
  • [30] Disabilities and Authentication Methods: Usability and Security
    Helkala, Kirsi
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 327 - 334