skip to main content
10.1145/2939918.2942423acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
poster

POSTER: Security Design Patterns With Good Usability

Published: 18 July 2016 Publication History

Abstract

This poster presents work-in-progress in the field of usable security. The usability of security mechanisms is crucial to avoid unintended misuse of security mechanisms which lowers the security level of a system. It is the goal of the work presented in this poster to identify security design patterns with good usability. Requirements for security design patterns with good usability stem from existing usable security design guidelines. A collection of security usability failures is presented as well as examples of how misuse anti-patterns can be derived from these failures. Misuse cases will be used in future work to identify security design patterns with good usability.

References

[1]
E. Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. John Wiley and Sons, 2013.
[2]
H.-J. Hof. User-centric it security -- how to design usable security mechanisms. In The Fifth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC 2012), pages 7--12. IARIA, November 2012.
[3]
H.-J. Hof. Towards enhanced usability of it security mechanisms -- how to design usable it security mechanisms using the example of email encryption. International Journal On Advances in Security, 6(1&2):78--87, 2013.
[4]
C. Steel, R. Nagappan, and R. Lai. Core Security Patterns. Prentice Hall, 2012.
[5]
J. Tidwell. Designing Interaces. O'Reilly Media, Inc., 2nd edition, 2010.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
July 2016
242 pages
ISBN:9781450342704
DOI:10.1145/2939918
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 July 2016

Check for updates

Author Tags

  1. design patterns
  2. security design patterns
  3. usability
  4. usable security

Qualifiers

  • Poster

Conference

WiSec'16
Sponsor:

Acceptance Rates

WiSec '16 Paper Acceptance Rate 13 of 51 submissions, 25%;
Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 209
    Total Downloads
  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media