WSEAS TRANSACTIONS on SYSTEMS
Characteristic trade-offs in designing large-scale biometric-based identity management systems
Journal of Network and Computer Applications
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
Case study: Securing knowledge in organizations: lessons from the defense and intelligence sectors
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 0.01 |
The problem with securing assets and their functionality is that, by definition, you don't want to protect them from everybody. It makes no sense to protect assets from their owners, or from other authorized individuals (including the trusted personnel who maintain the security system). In effect, then, all security systems need to allow people in, even as they keep people out. Designing a security system that accurately identifies, authenticates, and authorizes trusted individuals is highly complex and filled with nuance, but critical to security.