Designing a Trade-Off Between Usability and Security: A Metrics Based-Model
نویسندگان
چکیده
The design of usable yet secure systems raises crucial questions when it comes to balancing properly security and usability. Finding the right tradeoff between these two quality attributes is not an easy endeavor. In this paper, we introduce an original design model based on a novel usability inspection method. This new method, named Security Usability Symmetry (SUS), exploits automata machines theory and introduces the concept of an advanced Multifunction Teller Machine (MTM). We demonstrate, via case study, how to use this model during the design of secure, usable interactive systems.
منابع مشابه
A multi-objective resource-constrained optimization of time-cost trade-off problems in scheduling project
This paper presents a multi-objective resource-constrained project scheduling problem with positive and negative cash flows. The net present value (NPV) maximization and making span minimization are this study objectives. And since this problem is considered as complex optimization in NP-Hard context, we present a mathematical model for the given problem and solve three evolutionary algorithms;...
متن کاملDesigning Usable, Yet Secure User Authentication Service: The Cognitive Dimension
User authentication is key in many interactive tourism software applications and Websites including online booking and reservation applications, customer relationship management systems, etc. However, the design of a user authentication service raises crucial questions when it comes to properly balancing between security and usability. Furthermore, there is a common false design belief that sec...
متن کاملCaptchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis
CAPTCHAs have been deployed ubiquitously by web sites to combat automated malicious programs. Security against web bots and usability to legitimate users are two main goals that have to be simultaneously satisfied when designing a useful CAPTCHA scheme. However, there exists a well-known and intricate trade-off between these goals. So far, balancing this trade-off remains an art rather than a s...
متن کاملModeling the Trade-off between Manufacturing Cell Design and Supply Chain Design
Nowadays, we are witnessing the growth of firms that distribute the production capacity of their products to a wide geographic range to supply the demand of several markets. In this article, the relationships and interactions between cell design and supply chain design are investigated. For this purpose, a novel integrated model is presented for designing dynamic cellular manufacturing systems ...
متن کاملAnalysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
متن کامل