dc.contributor.author |
Gutmann, Peter |
en |
dc.contributor.author |
Grigg, Ian |
en |
dc.date.accessioned |
2006-11-30T21:00:20Z |
en |
dc.date.available |
2006-11-30T21:00:20Z |
en |
dc.date.issued |
2005 |
en |
dc.identifier.citation |
Security & Privacy Magazine, IEEE 3(4), 56-58 2005 |
en |
dc.identifier.issn |
1540-7993 |
en |
dc.identifier.uri |
http://hdl.handle.net/2292/262 |
en |
dc.description |
An open access copy of this article is available and complies with the copyright holder/publisher conditions. |
en |
dc.description.abstract |
In the security community, we've always recognized that our security proposals come with certain costs in terms of usability. Traditionally, that's the compromise we make to get security. But the market has ruled against us. Time and time again, our fielded secure systems are ignored, bypassed, turned off, or constrained to such a small part of the process that the security result is practically nonexistent. Even worse for our mental self-satisfaction, those systems that claim to deliver security to users simply don't pass muster--they're not what we'd like to think of as secure systems. |
en |
dc.publisher |
IEEE |
en |
dc.relation.ispartofseries |
IEEE Security & Privacy |
en |
dc.rights |
Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. Details obtained from http://www.sherpa.ac.uk/romeo/issn/1540-7993/ |
en |
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
en |
dc.source.uri |
http://dx.doi.org/10.1109/MSP.2005.104 |
en |
dc.title |
Security Usability |
en |
dc.type |
Journal Article |
en |
dc.subject.marsden |
Fields of Research::290000 Engineering and Technology |
en |
dc.identifier.doi |
10.1109/MSP.2005.104 |
en |
pubs.issue |
4 |
en |
pubs.begin-page |
56 |
en |
pubs.volume |
3 |
en |
dc.description.version |
VoR - Version of Record |
en |
dc.rights.holder |
Copyright: 2005 IEEE |
en |
pubs.end-page |
58 |
en |
dc.rights.accessrights |
http://purl.org/eprint/accessRights/OpenAccess |
en |