5 - 899 / 17 - 500 Usable Privacy and Security
نویسنده
چکیده
• Authentication and authorization • Pass-sentences, pass-phrases and mnemonic passwords • Randomly generated passwords • User Study: Human selection of text passwords 1.1 Authentication and authorization The management of multiple versions of user identities across multiple applications is difficult and one type of building blocks of identity management is 1 : • Password reset • Password synchronization • Single sign-on • Access management software Identification, Authentication and Authorization are three components of Identity management. There are many ways of defining these terms. One of the way is : • Authorization is a process by which an entity (such as a person or a computer system) determines whether another entity is who it claims
منابع مشابه
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملChallenges in Universally Usable Privacy and Security
Accessibility concerns compound the already-considerable difficulties of building systems that provide usable privacy and security. In addition to facing common concerns regarding the semantics of privacy and security tools, people with disabilities face accessibility obstacles, such as the inaccessibility of CAPTCHAs, phishing toolbars, verification images, and other displays that rely upon vi...
متن کاملUsable Privacy and Security: A Grand Challenge for HCI
In this position paper, we argue that usable privacy and security is a grand challenge that needs more attention from the HCI community. We also discuss benefits to and new challenges for HCI, and use our research experiences to provide a critique of HCI. Usable Privacy and Security: A Grand Challenge for HCI Jason I. Hong Carnegie Mellon University 5000 Forbes Ave, Pittsburgh PA 15213
متن کاملReflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices
The Second Usable Privacy and Security for Mobile Devices Workshop (U-PriSM 2) was co-located with MobileHCI'13 in Munich, Germany. The U-PriSM 2 was an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of mobile devices (smartphones and tablets). Security and privacy often involve having non-security experts, or ...
متن کاملRethinking Security Requirements in RE Research Technical Report
As information security became an increasing concern for software developers and users, requirements engineering (RE) researchers brought new insight to security requirements. Security requirements aim to address security at the early stages of system design while accommodating the complex needs of different stakeholders. Meanwhile, other research communities, such as usable privacy and securit...
متن کامل