M. Azuma, Software products evaluation system: quality models, metrics and processes-International Standards and Japanese practice, Information and Software Technology, vol.38, pp.145-154, 1996.

M. Beckerle and L. A. Martucci, Formal definitions for usable access control rule sets from goals to metrics, Proceedings of the Ninth Symposium on Usable Privacy and Security ACM, vol.2, 2013.

C. Braz, A. Seffah, and B. Naqvi, Integrating a Usable Security Protocol into User Authentication Services Design Process, 2018.

S. K. Card, A. Newell, and T. P. Moran, The psychology of human-computer interaction, 1983.

L. F. Cranor and S. Garfinkel, Security and usability: designing secure systems that people can use, 2005.

A. Forget, S. Chiasson, and R. Biddle, Choose Your Own Authentication, Proceedings of the 2015 New Security Paradigms Workshop ACM, pp.1-15, 2015.

Y. M. Hausawi and W. H. Allen, Usable-Security Evaluation, Human Aspects of Information Security, Privacy, and Trust Springer, pp.335-346, 2015.

Y. M. Hausawi, W. H. Allen, and G. S. Bahr, Choice-based authentication: A usable-security approach, pp.114-124, 2014.

E. Hayashi, S. Das, S. Amini, J. Hong, and I. Oakley, CASA: context-aware scalable authentication, Proceedings of the Ninth Symposium on Usable Privacy and Security ACM, p.3, 2013.

. Iso/iec, ISO/IEC 27000: Information technology --Security techniques --Information security management systems --Overview and vocabulary. International Organization for Standardization, 2014.

A. Jøsang, M. A. Zomai, and S. Suriadi, Usability and privacy in identity management architectures, Proceedings of the fifth Australasian symposium on ACSW frontiers, vol.68, pp.143-152, 2007.

R. Kainda, I. Flechais, R. , and A. , Security and usability: Analysis and evaluation, Availability, Reliability, and Security, 2010. ARES'10 International Conference on IEEE, pp.275-282, 2010.

A. Marinos and G. Briscoe, Community cloud computing, Cloud Computing Springer, pp.472-484, 2009.

S. K. Nayak, S. Mohapatra, and B. Majhi, An improved mutual authentication framework for cloud computing, International Journal of Computer Applications, vol.52, p.5, 2012.

J. Nielsen, Security & Human Factors, 2000.

K. Peffers, T. Tuunanen, M. A. Rothenberger, C. , and S. , A design science research methodology for information systems research, Journal of management information systems, vol.24, pp.45-77, 2007.

P. Salini and S. Kanmani, Survey and analysis on security requirements engineering, Computers & Electrical Engineering, vol.38, pp.1785-1797, 2012.

A. Seffah, M. Donyaee, R. B. Kline, and H. K. Padda, Usability measurement and metrics: A consolidated model, Software Quality Journal, vol.14, pp.159-178, 2006.

V. Solms, B. , V. Solms, and R. , The 10 deadly sins of information security management, Computers & Security, vol.23, pp.371-376, 2004.

R. Zhao and C. Yue, Toward a secure and usable cloud-based password manager for web browsers, Computers & Security, vol.46, pp.32-47, 2014.

. S. Faily and I. Fléchais, Finding and resolving security mis-usability with mis-usability cases, Requirement Engineering, vol.21, pp.209-223, 2016.