2010 International Conference on Availability, Reliability and Security 2010
DOI: 10.1109/ares.2010.77
|View full text |Cite
|
Sign up to set email alerts
|

Security and Usability: Analysis and Evaluation

Abstract: Abstract-The differences between the fields of HumanComputer Interaction and Security (HCISec) and HumanComputer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec is arguable given the fine balance between improving the ease of use of a secure system and potentially weakening its security. That is to say that the techniques prevalent in HCI are aimed at improving user… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
71
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 89 publications
(73 citation statements)
references
References 24 publications
0
71
0
Order By: Relevance
“…This effort has resulted in the Security Usability and Human-Computer Interaction and Security (HCISec/HCI-S) domains, and led to their establishment as crucial areas for research and application. Work within these fields typically studies the usability of mechanisms for authentication, encryption, PKI and device pairing, and generally security tools and secure systems [9].…”
Section: Introductionmentioning
confidence: 99%
“…This effort has resulted in the Security Usability and Human-Computer Interaction and Security (HCISec/HCI-S) domains, and led to their establishment as crucial areas for research and application. Work within these fields typically studies the usability of mechanisms for authentication, encryption, PKI and device pairing, and generally security tools and secure systems [9].…”
Section: Introductionmentioning
confidence: 99%
“…The first attempt to resolve the pairing issues was resurrecting duckling by [31]. It was based on standard cables and physical interfaces but its usability was limited up till 1990's, today it is totally obsolete because of devices' variation and diversity.…”
Section: ) Others A) Resurrecting Ducklingmentioning
confidence: 99%
“…IR works as the OOB channel in pairing process. The user only initiates the setup then it works itself but IR is replaced now with other more efficient and easy to use technologies like Bluetooth [31], [38], [42]. …”
Section: ) Others A) Resurrecting Ducklingmentioning
confidence: 99%
“…A security-usability threat model has been presented in [44] that focuses on HCI Security (HCISec). HCISec is centered around the user, who demands security as well as usability.…”
Section: Framework/modelsmentioning
confidence: 99%