Game theoretical analysis of usable security and privacy
نویسندگان
چکیده
منابع مشابه
Challenges in Universally Usable Privacy and Security
Accessibility concerns compound the already-considerable difficulties of building systems that provide usable privacy and security. In addition to facing common concerns regarding the semantics of privacy and security tools, people with disabilities face accessibility obstacles, such as the inaccessibility of CAPTCHAs, phishing toolbars, verification images, and other displays that rely upon vi...
متن کاملUsable Privacy and Security in Personal Health Records
PHRs (Personal Health Records) store individuals’ personal health information. Access to this data is controlled by the patient, rather than by the health care provider. Companies such as Google and Microsoft are establishing a leadership position in this emerging market. In this context, the need for psychological acceptability in privacy and security protection mechanisms is essential. Any pr...
متن کامل5 - 899 / 17 - 500 Usable Privacy and Security
• Authentication and authorization • Pass-sentences, pass-phrases and mnemonic passwords • Randomly generated passwords • User Study: Human selection of text passwords 1.1 Authentication and authorization The management of multiple versions of user identities across multiple applications is difficult and one type of building blocks of identity management is 1 : • Password reset • Password synch...
متن کاملUsable Privacy and Security: A Grand Challenge for HCI
In this position paper, we argue that usable privacy and security is a grand challenge that needs more attention from the HCI community. We also discuss benefits to and new challenges for HCI, and use our research experiences to provide a critique of HCI. Usable Privacy and Security: A Grand Challenge for HCI Jason I. Hong Carnegie Mellon University 5000 Forbes Ave, Pittsburgh PA 15213
متن کاملThe Functionality-Security-Privacy Game
Privacy preservation in the information society is in many respects parallel to environment preservation in the physical world. In this way, “green ICT services” are those achieving functionality and security with minimum invasion of the privacy of individuals, where such an invasion can be regarded as a kind of pollution as harmful in the long run to their moral welfare as physical pollution i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Privacy
سال: 2018
ISSN: 2475-6725,2475-6725
DOI: 10.1002/spy2.55