Poster: Security Design Patterns With Good Usability

被引:0
|
作者
Hof, Hans-Joachim [1 ]
Socher, Gudrun [2 ]
机构
[1] Munich Univ Appl Sci, Muse Munich IT Secur Res Grp, Lothstr 64, D-80335 Munich, Germany
[2] Munich Univ Appl Sci, Dept Comp Sci & Math, Lothstr 64, D-80335 Munich, Germany
来源
PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16) | 2016年
关键词
Usability; Security Design Patterns; Design Patterns; Usable Security;
D O I
10.1145/2939918.2942423
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This poster presents work-in-progress in the field of usable security. The usability of security mechanisms is crucial to avoid unintended misuse of security mechanisms which lowers the security level of a system. It is the goal of the work presented in this poster to identify security design patterns with good usability. Requirements for security design patterns with good usability stem from existing usable security design guidelines. A collection of security usability failures is presented as well as examples of how misuse anti-patterns can be derived from these failures. Misuse cases will be used in future work to identify security design patterns with good usability.
引用
收藏
页码:227 / 228
页数:2
相关论文
共 50 条
  • [31] A methodology to Evaluate the Usability of Security APIs
    Wijayarathna, Chamila
    Arachchilage, Nalin A. G.
    2018 IEEE 9TH INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS' 2018), 2018,
  • [32] Usability of IT-Security in Smart Grids
    Patil, Amit Dilip
    De Meer, Hermann
    E-ENERGY'18: PROCEEDINGS OF THE 9TH ACM INTERNATIONAL CONFERENCE ON FUTURE ENERGY SYSTEMS, 2018, : 393 - 395
  • [33] An Empirical Analysis on the Usability and Security of Passwords
    Walia, Kanwardeep Singh
    Shenoy, Shweta
    Cheng, Yuan
    2020 IEEE 21ST INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2020), 2020, : 1 - 8
  • [34] Balancing Security and Usability of Local Security Mechanisms for Mobile Devices
    Yang, Shuzhe
    Bal, Goekhan
    INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 327 - 338
  • [35] A Method to Design Information Security Feedback Using Patterns and HCI-Security Criteria
    Munoz-Arteaga, Jaime
    Mendoza Gonzalez, Ricardo
    Vargas Martin, Miguel
    Vanderdonckt, Jean
    Alvarez-Rodriguez, Francisco
    Gonzalez Calleros, Juan
    COMPUTER-AIDED DESIGN OF USER INTERFACES VI, 2009, : 283 - 294
  • [36] Empirical Investigations on Usability of Security Warning Dialogs: End Users Experience
    Ahmad, Farah Nor Aliah
    Zaaba, Zarul Fitri
    Aminuddin, Mohamad Amar Irsyad Mohd
    Abdullah, Nasuha Lee
    ADVANCES IN CYBER SECURITY (ACES 2019), 2020, 1132 : 335 - 349
  • [37] Multiple design patterns for voice over IP (VoIP) security
    Anwar, Zahid
    Yurcik, William
    Johnson, Ralph E.
    Hafiz, Munawar
    Campbell, Roy H.
    2006 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2006, : 485 - +
  • [38] Usability Testing of Data Entry Patterns Implemented According to Material Design Guidelines for the Web
    Drygielski, Marcin
    Indyka-Piasecka, Agnieszka
    Piwowarczyk, Mateusz
    Telec, Zbigniew
    Trawinski, Bogdan
    Trong Hai Duong
    COMPUTATIONAL COLLECTIVE INTELLIGENCE, PT I, 2019, 11683 : 697 - 711
  • [39] Good practices in usability testing on people with disabilities
    Delgado-Quesada, Gabriela
    Porras-Fernandez, Josue
    Araya-Orozco, Karla
    Chacon-Rivas, Mario
    2019 INTERNATIONAL CONFERENCE ON INCLUSIVE TECHNOLOGIES AND EDUCATION (CONTIE 2019), 2019, : 187 - 190
  • [40] An Era of Usability Design-Perspectives on the Realistic Significance of "Usability" Design Research
    Li, Wenxia
    9TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, VOLS 1 AND 2: MULTICULTURAL CREATION AND DESIGN - CAID& CD 2008, 2008, : 145 - 148