Red Button and Yellow Button: Usable Security for Lost Security Tokens

نویسندگان

  • Ian Goldberg
  • Graeme Jenkinson
  • David Llewellyn-Jones
  • Frank Stajano
چکیده

Currently, losing a security token places the user in a dilemma: reporting the loss as soon as it is discovered involves a significant burden which is usually overkill in the common case that the token is later found behind a sofa. Not reporting the loss, on the other hand, puts the security of the protected account at risk and potentially leaves the user liable. We propose a simple architectural solution with wide applicability that allows the user to reap the security benefit of reporting the loss early, but without paying the corresponding usability penalty if the event was later discovered to be a false alarm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Suture Button Construct for Acute Ankle Syndesmotic Injuries; A Prospective Clinical and Radiological Analysis.

  Background: The importance of the syndesmosis in ankle stability is well recognized. Numerous means of fixation have been described for syndesmotic injuries including the suture button technique. Significant cost limits the use the commercially available options. We, therefore, designed a cheap and readily available alternative construct. We aim to assess the results of using a novel suture-...

متن کامل

Comparison of Usability of Touch-screen and Button Cell Phones Among Elderly Users

Background and Objectives: The use of new technologies, particularly mobile phones, is drastically growing on a daily basis. The usability of mobile phones can be determined for different age groups in order to reach a balanced development plan with respect to this technology. The present study aimed to investigate and compare the usability of touch-screen and button cell phones among Iranian e...

متن کامل

Peer Production of Privacy and Security Information

If the public switched telephone system required human operators in the model of the turn of the twentieth century, as it required at the turn of the nineteenth, every man, woman ,and child in American would have to be a telephone switch operator. In fact, every individual who makes a phone call is a switch operator. The switch interface is a twelve button pad that fails almost every possible s...

متن کامل

Effect of malic acid on bioactive components and antioxidant properties of sliced button mushroom (Agaricus bisporus) during storage

Background: White button mushroom (Agaricus bisporus) is one of the most sensitive agricultural crops after harvesting and its antioxidant properties tend to decrease during post-harvest storage with the passage of time. OBJECTIVES: The possible role of exogenous application of malic acid as dipping treatment on bioactive components and antioxidant properties of sliced white button mushroom dur...

متن کامل

Automated Security Protocol Analysis With the AVISPA Tool

The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of automatic protocol analysis techniques. Experimental results, carried out on a large library of Internet secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016