Designing Usable and Secure Software with IRIS and CAIRIS

Everyone expects the products and services they use to be secure, but 'building security in' at the earliest stages of a system's design also means designing for use as well. Software that is unusable to end-users and unwieldy to developers and administrators may be insecure as errors...

Full description

Bibliographic Details
Main Author: Faily, Shamal (Author, http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2018.
Edition:1st ed. 2018.
Subjects:
Online Access:Full Text via HEAL-Link
LEADER 02956nam a2200481 4500
001 978-3-319-75493-2
003 DE-He213
005 20191025082233.0
007 cr nn 008mamaa
008 180428s2018 gw | s |||| 0|eng d
020 |a 9783319754932  |9 978-3-319-75493-2 
024 7 |a 10.1007/978-3-319-75493-2  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Faily, Shamal.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Designing Usable and Secure Software with IRIS and CAIRIS  |h [electronic resource] /  |c by Shamal Faily. 
250 |a 1st ed. 2018. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2018. 
300 |a XXX, 258 p. 78 illus., 42 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Foundations -- IRIS and CAIRIS -- Beyond Requirements. . 
520 |a Everyone expects the products and services they use to be secure, but 'building security in' at the earliest stages of a system's design also means designing for use as well. Software that is unusable to end-users and unwieldy to developers and administrators may be insecure as errors and violations may expose exploitable vulnerabilities. This book shows how practitioners and researchers can build both security and usability into the design of systems. It introduces the IRIS framework and the open source CAIRIS platform that can guide the specification of secure and usable software. It also illustrates how IRIS and CAIRIS can complement techniques from User Experience, Security Engineering and Innovation & Entrepreneurship in ways that allow security to be addressed at different stages of the software lifecycle without disruption. Real-world examples are provided of the techniques and processes illustrated in this book, making this text a resource for practitioners, researchers, educators, and students. 
650 0 |a Computer security. 
650 0 |a Software engineering. 
650 0 |a User interfaces (Computer systems). 
650 1 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Software Engineering.  |0 http://scigraph.springernature.com/things/product-market-codes/I14029 
650 2 4 |a User Interfaces and Human Computer Interaction.  |0 http://scigraph.springernature.com/things/product-market-codes/I18067 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319754925 
776 0 8 |i Printed edition:  |z 9783319754949 
856 4 0 |u https://doi.org/10.1007/978-3-319-75493-2  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)