HOME > 상세정보

상세정보

Security and usability : designing secure systems that people can use

Security and usability : designing secure systems that people can use (2회 대출)

자료유형
단행본
개인저자
Cranor, Lorrie Faith. Garfinkel, Simson.
서명 / 저자사항
Security and usability : designing secure systems that people can use / edited by Lorrie Faith Cranor & Simson Garfinkel.
발행사항
Beijing ;   Sebastapol, CA :   O'Reilly,   c2005.  
형태사항
xviii, 714 p. : ill. ; 24 cm.
ISBN
0596008279 (pbk.)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security.
000 00000cam u2200205 a 4500
001 000045936677
005 20180328112224
008 180327s2005 cc a b 001 0 eng d
010 ▼a 2006271007
015 ▼a GBA578560 ▼2 bnb
020 ▼a 0596008279 (pbk.)
035 ▼a (KERIS)REF000012532804
040 ▼a UKM ▼b eng ▼c UKM ▼d BAKER ▼d DST ▼d IXA ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b S3758 2005
082 0 4 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b S44691
245 0 0 ▼a Security and usability : ▼b designing secure systems that people can use / ▼c edited by Lorrie Faith Cranor & Simson Garfinkel.
260 ▼a Beijing ; ▼a Sebastapol, CA : ▼b O'Reilly, ▼c c2005.
300 ▼a xviii, 714 p. : ▼b ill. ; ▼c 24 cm.
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security.
700 1 ▼a Cranor, Lorrie Faith.
700 1 ▼a Garfinkel, Simson.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 S44691 등록번호 121243920 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users.

Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless.

There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research.

Security & Usability groups 34 essays into six parts:

  • Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic.
  • Authentication Mechanisms-- techniques for identifying and authenticating computer users.
  • Secure Systems--how system software can deliver or destroy a secure user experience.
  • Privacy and Anonymity Systems--methods for allowing people to control the release of personal information.
  • Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g., IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability.
  • The Classics--groundbreaking papers that sparked the field of security and usability.

This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.


정보제공 : Aladin

저자소개

Simson Garfinkel(지은이)

1965년 7월 12일, 미국에서 태어나 현재 매사추세츠주 캠브리지에서 아내와 예쁜 딸과 함께 살고 있다. 금빛 눈동자에 갈색 고수머리, 무난한 성격으로 대표되는 O형 혈액형을 지닌 저자를 더 자세히 알고 싶다면 저자의 홈페이지(http://simson.net/)를 방문해 보라. MIT와 콜롬비아대학에서 수학하고, 현재 첨단기술 기업인이자 언론인으로 활동 중이다. 컴퓨터 사용자들을 대상으로 한 「보스톤글로브」의 주간 칼럼 '심슨 세즈(Simson Says)'가 유명하며, 그밖에도 「와이어드」「컴퓨터월드」「포브스」「뉴욕타임즈」「테크놀로지리뷰」등 50종이 넘는 출판물에 글을 기고했다.

Lorrie Faith Cranor(엮은이)

정보제공 : Aladin

목차

Preface	p. ix
Part 1	Realigning Usability and Security	p. xxi
1	    Psychological Acceptability Revisited   Matt Bishop	p. 1
2	    Usable Security   M. Angela Sasse and Ivan Flechais	p. 13
3	    Design for Usability   Bruce Tognazzini	p. 31
4	    Usability Design and Evaluation for Privacy and Security Solutions   Clare-Marie Karat and Carolyn Brodie and John Karat	p. 47
5	    Designing Systems That People Will Trust   Andrew S. Patrick and Pamela Briggs and Stephen Marsh	p. 75
Part 2	Authentication mechanisms	p. 101
6	    Evaluating Authentication Mechanisms   Karen Renaud	p. 103
7	    The Memorability and Security of Passwords   Jeff Yan and Alan Blackwell and Ross Anderson and Alasdair Grant	p. 129
8	    Designing Authentication Systems with Challenge Questions   Mike Just	p. 143
9	    Graphical Passwords   Fabian Monrose and Michael K. Reiter	p. 157
10	    Usable Biometrics   Lynne Coventry	p. 175
11	    Identifying Users from Their Typing Patterns   Alen Peacock and Xian Ke and Matt Wilkerson	p. 199
12	    The Usability of Security Devices   Ugo Piazzalunga and Paolo Salvaneschi and Paolo Coffetti	p. 221
Part 3	Secure Systems	p. 245
13	    Guidelines and Strategies for Secure Interaction Design   Ka-Ping Yee	p. 247
14	    Fighting Phishing at the User Interface   Robert C. Miller and Min Wu	p. 275
15	    Sanitization and Usability   Simson Garfinkel	p. 293
16	    Making the Impossible Easy: Usable PKI   Dirk Balfanz and Glenn Durfee and D. K. Smetters	p. 319
17	    Simple Desktop Security with Chameleon   A. Chris Long and Courtney Moskowitz	p. 335
18	    Security Administration Tools and Practices   Eser Kandogan and Eben M. Haber	p. 357
Part 4	Privacy and Anonymity Systems	p. 379
19	    Privacy Issues and Human-Computer Interaction   Mark S. Ackerman and Scott D. Mainwaring	p. 381
20	    A User-Centric Privacy Space Framework   Benjamin Brunk	p. 401
21	    Five Pitfalls in the Design for Privacy   Scott Lederer and Jason I. Hong and Anind K. Dey and James A. Landay	p. 421
22	    Privacy Policies and Privacy Preferences   Lorrie Faith Cranor	p. 447
23	    Privacy Analysis for the Casual User with Bugnosis   David Martin	p. 473
24	    Informed Consent by Design   Batya Friedman and Peyina Lin and Jessica K. Miller	p. 495
25	    Social Approaches to End-User Privacy Management   Jeremy Goecks and Elizabeth D. Mynatt	p. 523
26	    Anonymity Loves Company: Usability and the Network Effect   Roger Dingledine and Nick Mathewson	p. 547
Part 5	Commercializing Usability: The Vendor Perspective	p. 561
27	    ZoneAlarm: Creating Usable Security Products for Consumers   Jordy Berson	p. 563
28	    Firefox and the Worry-Free Web   Blake Ross	p. 577
29	    Users and Trust: A Microsoft Case Study   Chris Nodder	p. 589
30	    IBM Lotus Notes/Domino: Embedding Security in Collaborative Applications   Mary Ellen Zurko	p. 607
31	    Achieving Usable Security in Groove Virtual Office   George Moromisato and Paul Boyd and Nimisha Asthagiri	p. 623
Part 6	The Classics	p. 637
32	    Users Are Not the Enemy   Anne Adams and M. Angela Sasse	p. 639
33	    Usability and Privacy: A Study of KaZaA P2P File Sharing   Nathaniel S. Good and Aaron Krekelberg	p. 651
34	    Why Johnny Can''t Encrypt   Alma Whitten and J. D. Tygar	p. 669
Index	p. 693

관련분야 신착자료

Harvard Business Review (2025)