Letters: Convenience vs. Security
ثبت نشده
چکیده
منابع مشابه
The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques1
It has long been known that security is easiest to achieve when it is designed in from the start. Unfortunately, it has also become evident that systems built with security as a priority are rarely selected for wide spread deployment, because most consumers choose features, convenience, and performance over security. Thus security officers are often denied the option of choosing a truly secure ...
متن کاملThe Cracker Patch Choice: An Analysis of Post Hoc Security Techniques
It has long been known that security is easiest to achieve when it is designed in from the start. Unfortunately, it has also become evident that systems built with security as a priority are rarely selected for wide spread deployment, because most consumers choose features, convenience, and performance over security. Thus security officers are often denied the option of choosing a truly secure ...
متن کاملNCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and user needs, which must be carefully balanced. We have designed and built a new cryptographic file system called NCryptfs with the primary goal of allowing users to tailor the level of security vs. convenience to fit their ...
متن کاملVs-star: A visual interpretation system for visual surveillance
In recent year, intelligent visual surveillance has become more and more important for enhanced security. In this paper, we will introduce some recent work in image and video understanding. First, we will give an introduction of the related video surveillance system in recent years, in particular, we will describe algorithms and systems developed in our group for the automatic interpretation of...
متن کاملWhen do online shoppers appreciate security enhancement efforts? Effects of financial risk and security level on evaluations of customer authentication
As the popularity of online shopping grows, concerns about identity theft and fraud are increasing. While stronger customer authentication procedures may provide greater protection and thus benefit customers and retailers, security is often traded off against convenience. To provide insight into this security-convenience trade-off in customer authentication, we experimentally investigated how l...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Software
دوره 22 شماره
صفحات -
تاریخ انتشار 2005