5 - 899 / 17 - 500 Usable Privacy and Security

نویسنده

  • Sasha Romanosky
چکیده

• Authentication and authorization • Pass-sentences, pass-phrases and mnemonic passwords • Randomly generated passwords • User Study: Human selection of text passwords 1.1 Authentication and authorization The management of multiple versions of user identities across multiple applications is difficult and one type of building blocks of identity management is 1 : • Password reset • Password synchronization • Single sign-on • Access management software Identification, Authentication and Authorization are three components of Identity management. There are many ways of defining these terms. One of the way is : • Authorization is a process by which an entity (such as a person or a computer system) determines whether another entity is who it claims

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Challenges in Universally Usable Privacy and Security

Accessibility concerns compound the already-considerable difficulties of building systems that provide usable privacy and security. In addition to facing common concerns regarding the semantics of privacy and security tools, people with disabilities face accessibility obstacles, such as the inaccessibility of CAPTCHAs, phishing toolbars, verification images, and other displays that rely upon vi...

متن کامل

Usable Privacy and Security: A Grand Challenge for HCI

In this position paper, we argue that usable privacy and security is a grand challenge that needs more attention from the HCI community. We also discuss benefits to and new challenges for HCI, and use our research experiences to provide a critique of HCI. Usable Privacy and Security: A Grand Challenge for HCI Jason I. Hong Carnegie Mellon University 5000 Forbes Ave, Pittsburgh PA 15213

متن کامل

Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices

The Second Usable Privacy and Security for Mobile Devices Workshop (U-PriSM 2) was co-located with MobileHCI'13 in Munich, Germany. The U-PriSM 2 was an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of mobile devices (smartphones and tablets). Security and privacy often involve having non-security experts, or ...

متن کامل

Rethinking Security Requirements in RE Research Technical Report

As information security became an increasing concern for software developers and users, requirements engineering (RE) researchers brought new insight to security requirements. Security requirements aim to address security at the early stages of system design while accommodating the complex needs of different stakeholders. Meanwhile, other research communities, such as usable privacy and securit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006