2016
DOI: 10.6028/nist.ir.8080
|View full text |Cite
|
Sign up to set email alerts
|

Usability and Security Considerations for Public Safety Mobile Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(18 citation statements)
references
References 12 publications
0
18
0
Order By: Relevance
“…Readers are highly encouraged to first read NIST Interagency Report (NISTIR) 8080, Usability and Security Considerations for Public Safety Mobile Authentication [8] and NISTIR 8135, Identifying and Categorizing Data Types for Public Safety Mobile Applications [2]. NISTIR 8080 analyzes usability issues pertaining to the use of various authentication technologies, including wearable devices.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Readers are highly encouraged to first read NIST Interagency Report (NISTIR) 8080, Usability and Security Considerations for Public Safety Mobile Authentication [8] and NISTIR 8135, Identifying and Categorizing Data Types for Public Safety Mobile Applications [2]. NISTIR 8080 analyzes usability issues pertaining to the use of various authentication technologies, including wearable devices.…”
Section: Previous Workmentioning
confidence: 99%
“…Multiple authentication methods exist and should be analyzed for use. NISTIR 8080 Usability and Security Considerations for Public Safety Mobile Authentication discusses this and other usability issues first responders face as well as how they impact other areas of security [8].…”
Section: Ease Of Authenticationmentioning
confidence: 99%
“…To identify these devices, device administrators will need to obtain information about their prospective or current devices. A device administrator can use this information to decide whether a device has most of their required features, which may be prioritized by usability and security capabilities [18].…”
Section: Identify -Your Public Safety Needs and Devicesmentioning
confidence: 99%
“…Most devices require secure configuration to allow an organization to configure to their specific needs (e.g., authentication and encryption requirements). When applying security, public safety device administrators should consider both usability and security [18]. Usability and security are both very important to public safety officials.…”
Section: Protect -Yourself By Applying Security and Training Usersmentioning
confidence: 99%
“…Multiple authentication methods exist and should be analyzed for use. NISTIR 8080 Usability and Security Considerations for Public Safety Mobile Authentication discusses this and other usability issues first responders face as well as how they impact other areas of security [11].…”
Section: Ease Of Authenticationmentioning
confidence: 99%