Aligning security and usability

被引:75
作者
Yee, KP [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
关键词
D O I
10.1109/MSP.2004.64
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 [计算机科学与技术];
摘要
The bringing up of security and usability into alignment is discussed. Conflicts between security and usability can be avoided by taking a different approach to security in the design process and the design itself. An essential technique for aligning security and usability is incorporating security decisions into the users' workflow by inferring authorization from acts of designation that are already part of their primary task. It is found that both the security and usability communities have advocated iterative development processes based on repeated analysis, design, and evaluation cycles, rather than linear processes in which security or usability testing occurs at the end.
引用
收藏
页码:48 / 55
页数:8
相关论文
共 9 条
[1]
GARFINKEL S, 1996, PRACTICAL UNIX INTER, P6
[2]
Computer security in the real world [J].
Lampson, BW .
COMPUTER, 2004, 37 (06) :37-46
[3]
MCWILLIAMS B, 2002, WIRED NEWS 0426
[4]
NORMAN D, 1998, INVISIBLE COMPUTER, P205
[5]
PROTECTION OF INFORMATION IN COMPUTER SYSTEMS [J].
SALTZER, JH ;
SCHROEDER, MD .
PROCEEDINGS OF THE IEEE, 1975, 63 (09) :1278-1308
[6]
SCHNEIER B, 2004, SECRETS LIES DIGITAL, P12
[7]
VIEGA J, 2002, BUILDING SECURE SOFT, P14
[8]
WAGNER D, SECURITY ANAL COMBEX
[9]
Yee KP, 2002, LECT NOTES COMPUT SC, V2513, P278