publication . Thesis . 2005

The development of secure and usable systems.

Flechais, I.;
Open Access English
  • Published: 01 Jan 2005
  • Publisher: University of London
  • Country: United Kingdom
Abstract
"People are the weakest link in the security chain"---Bruce Schneier. The aim of the thesis is to investigate the process of designing secure systems, and how designers can ensure that security mechanisms are usable and effective in practice. The research perspective is one of security as a socio-technical system. A review of the literature of security design and Human Computer Interactions in Security (HCISec) reveals that most security design methods adopt either an organisational approach, or a technical focus. And whilst HCISec has identified the need to improve usability in computer security, most of the current research in this area is addressing the issue...
Related Organizations
Download from
UCL Discovery
Thesis . 2005
80 references, page 1 of 6

[1] CERT, http://www.cert.org

[2] Security Patterns, http://www.securitypattems.org/

[3] BioSimGrid. 2 0 04. w w w .biosiiiigrid.ois

[4] Cambridge Dictionary. 2 0 0 5 . http://dictionary.cambridge.org/

[5] CLEF Services. 2 0 0 5 . http://www.clef-user.com/page2.html

[6] Digital Guards Glossary. 2 0 0 5 . http://www.digitalguards.coin/Qossary.htm

[7] eScience. 2 0 05. http://www.nesc.ac.uk

[8] European Grid o f Solar Observations. 2 0 0 5 . http://www.egso.org

[9] Adams, A. Users' perception o f privacy in multimedia communication. Unpublished Ph.D.Thesis, School of Psychology, University College London, UK 2 0 0 1 .

[10] Adams, A. & Sasse, M. A. Users Are Not The Enemy. Communications of the ACM 1999. Vol. 42, No. 12 December [OpenAIRE]

[11] Adams, J. Risk. 1995. UCL Press.

[12] Adams, J. & Thompson, M. Taking account o f societal concerns about risk: fram ing the problem. Health and Safety Executive. Research Report 035 2 0 0 2 . http://www.geog.ucl.ac.uk/-jadams/publish.htm

[13] Anderson, R. Why Cryptosystems Fail. ACM Conf.Computer and Communication Security C C S ^ 1993. pp 215-227.

[14] Anderson, R. The DeCODE Proposal fo r an Icelandic Health Database. 1998. http://www.cl.cam.ac.uk/~rjal4/iceland/iceland.html

[15] Anderson, R. Security Engineering: A Guide to Building Dependable Distributed Systems. 2001. Wiley.

80 references, page 1 of 6
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue