Password Management: Distribution, Review and Revocation
نویسندگان
چکیده
منابع مشابه
Password Management through PWM
Consulting Everett NL Wiersedreef 5-7 3433ZX Nieuwegein, NL [email protected] Abstract: There have been many initiatives around open source identity and access management, federated authentication standards and products for the web. All of these products and standards require a user store with credential information. Most often this is an LDAP directory. The most common type of credentia...
متن کاملExpert Password Management
Experts are often asked for advice about password management, but how do they manage their own passwords? We conducted interviews with researchers and practitioners in computer security, asking them about their password management behaviour. We conducted a thematic analysis of our data, and found that experts described a dichotomy of behaviour where they employed more secure behaviour on import...
متن کاملSelf-Healing Key Distribution with Revocation
We address the problem of establishing a group key amongst a dynamic group of users over an unreliable, or lossy, network. We term our key distribution mechanisms self-healing because users are capable of recovering lost group keys on their own, without requesting additional transmissions from the group manager, thus cutting back on network traffic, decreasing the load on the group manager, and...
متن کاملImproving Usability of Password Management with Standardized Password Policies
Recent studies indicate that many users have difficulties managing online passwords for the increasing number of accumulated accounts. As a result, users often adopt strategies to simplify password management, such as selecting weak passwords and reusing passwords across multiple accounts, which unfortunately can cause security vulnerabilities. This problem is exacerbated by the fact that users...
متن کامل∅pass: Zero-storage Password Management Based on Password Reminders
A plethora of Internet services and applications require user authentication. Although many alternatives have been proposed, and despite the significant advancement in attackers’ capabilities to perform password cracking, the most attractive authentication technology today, is still text-based passwords. The last years, there is a rapid increase in the number of web services a user accesses in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Computer Journal
سال: 2014
ISSN: 0010-4620,1460-2067
DOI: 10.1093/comjnl/bxu125