咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Estimating Usable-Security Thr... 收藏

Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique

作     者:Abdulaziz Attaallah Raees Ahmad Khan 

作者机构:Department of Computer ScienceFaculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information TechnologyBabasaheb Bhimrao Ambedkar UniversityLucknow226025Uttar PradeshIndia 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2022年第70卷第3期

页      面:5683-5705页

核心收录:

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:Funding for this study was received from the Deanship of Scientific Research(DSR)at King Abdulaziz University Jeddah Kingdom of Saudi Arabia under the Grant No.G:095-611-14422 

主  题:Usable security accessibility expert evaluation usability criteria fuzzy logic 

摘      要:The apparent contradiction between usability and security has been discussed in the literature for several *** continuous trade-off requires be acknowledging and handling whenever security solutions are ***,some progressive analysts point out that present security solutions are usually very difficult for several users,and they have expressed a willingness to simplify the security product user *** security is still mostly unexplored territory in computer *** we are all aware with security and usability on many levels,usable security has received little operational *** have recently focused primarily on usable *** consumers prefer to discard unsatisfactory solutions,attaining well-balanced degrees of both is a prerequisite for adequate *** should be examined from the viewpoint of security to be properly *** aim of this research study is to explore and discuss universally accepted and solutionindependent factors influencing the perceived usable-security of institutional *** integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology,and the experts and academicians opinion were *** use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分