Debunking Security-Usability Tradeoff Myths.
M. Angela SasseMatthew SmithCormac HerleyHeather LipfordKami VanieaPublished in: IEEE Secur. Priv. (2016)
Keyphrases
- information security
- access control
- network security
- security policies
- data sets
- computer security
- security issues
- information assurance
- security threats
- security requirements
- intrusion detection
- trade off
- statistical databases
- security mechanisms
- security problems
- information systems
- security management
- computational complexity
- cyber security
- security systems
- cryptographic protocols
- security vulnerabilities
- neural network