Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration.
Cynthia KuoAdrian PerrigJesse WalkerPublished in: Interactions (2006)
Keyphrases
- evaluation method
- network configuration
- security requirements
- user interface
- security issues
- key management
- evaluation model
- evaluation methods
- sensitive data
- security protocols
- information security
- encryption scheme
- neural network
- wireless networks
- quality of service
- access control
- attack graph
- intrusion detection
- network security
- analytic hierarchy process
- smart card
- fuzzy comprehensive evaluation method
- wireless sensor networks
- fuzzy comprehensive evaluation
- credit risk