Security Usability

Show simple item record

dc.contributor.author Gutmann, Peter en
dc.contributor.author Grigg, Ian en
dc.date.accessioned 2006-11-30T21:00:20Z en
dc.date.available 2006-11-30T21:00:20Z en
dc.date.issued 2005 en
dc.identifier.citation Security & Privacy Magazine, IEEE 3(4), 56-58 2005 en
dc.identifier.issn 1540-7993 en
dc.identifier.uri http://hdl.handle.net/2292/262 en
dc.description An open access copy of this article is available and complies with the copyright holder/publisher conditions. en
dc.description.abstract In the security community, we've always recognized that our security proposals come with certain costs in terms of usability. Traditionally, that's the compromise we make to get security. But the market has ruled against us. Time and time again, our fielded secure systems are ignored, bypassed, turned off, or constrained to such a small part of the process that the security result is practically nonexistent. Even worse for our mental self-satisfaction, those systems that claim to deliver security to users simply don't pass muster--they're not what we'd like to think of as secure systems. en
dc.publisher IEEE en
dc.relation.ispartofseries IEEE Security & Privacy en
dc.rights Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. Details obtained from http://www.sherpa.ac.uk/romeo/issn/1540-7993/ en
dc.rights.uri https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm en
dc.source.uri http://dx.doi.org/10.1109/MSP.2005.104 en
dc.title Security Usability en
dc.type Journal Article en
dc.subject.marsden Fields of Research::290000 Engineering and Technology en
dc.identifier.doi 10.1109/MSP.2005.104 en
pubs.issue 4 en
pubs.begin-page 56 en
pubs.volume 3 en
dc.description.version VoR - Version of Record en
dc.rights.holder Copyright: 2005 IEEE en
pubs.end-page 58 en
dc.rights.accessrights http://purl.org/eprint/accessRights/OpenAccess en


Files in this item

Find Full text

This item appears in the following Collection(s)

Show simple item record

Share

Search ResearchSpace


Browse

Statistics