Abstract

Abstract In this paper, we review security and usability scenarios. We propose security enhancements without losing usability and apply a new approach to popular application systems. Specifically, we analyze database security for access control, auditing, authentication, encryption, integrity control, backups, separation of environment, and secure configuration. Finally, we present our recommendations for system security and usability that work together.

Highlights

  • Related workAs the Internet becomes more and more popular, Internet-based network servers provide and allow information access remotely and locally

  • We propose security enhancements without losing usability and apply a new approach to popular application systems

  • Consider able study has been performed on information security [1]

Read more

Summary

Related work

As the Internet becomes more and more popular, Internet-based network servers provide and allow information access remotely and locally. Usable security has been studied in human-centered computing. We discuss how security can meet usability in popular application systems within a database. Gunson et al conducted an experimental approach on automated telephone banking systems and found that understanding of the security measures is improved when an extended authentication procedure is applied. They detected that the cost of usability is more with a higher understanding of security. M ihajlov et al [28] developed a theoretical framework using quantification and quality measurements They determined both security and usabilit y properties in the study [1, 3, and 13]. Their research focused on the needs of end users

Our approach
Limited electronic information access
Access control models
Types of access control models
Column-level encryption
Field-level encryption
Encrypting file system
Database integrity
Data Integrity
Check constraints supported in all different databas es
Database backup
Application security: balancing encryption and access control
Quality standards for security evaluation
11. Secure configuration
Findings
13. Recommendations
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call