Identity management : strengthening one-time password authentication through usability

作者: Mohammed Hamad Alzomai

DOI:

关键词:

摘要: Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which interaction a computer program or web site designed. Identity management systems need to provide adequate usability should have simple intuitive interface. The system not only be designed satisfy service provider requirements but it has consider user requirements, otherwise will lead inconvenience poor for users when managing their identities. With interface regard security, highly likely that security. rapid growth number of online services leads an increasing different digital identities each needs manage. As result, many people feel overloaded credentials, turn negatively impacts ability manage them securely. Passwords are perhaps most common type credential used today. To avoid tedious task remembering difficult passwords, often behave less securely by using low entropy weak passwords. Weak passwords bad password habits represent security threats services. Some solutions been developed eliminate create A typical solution based on generating one-time i.e. single session transaction usage. Unfortunately, these do scalability and/or they simply insecure. In this thesis, aspects contemporary methods authentication (OTP) examined analyzed. addition, more scalable good experience while at same time preserving strong proposed.

参考文章(71)
MA Sasse, Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery Presented at: Proceedings of 2003 Workshop on Human-Computer Interaction and Security Systems at CHI 2003, Ft. Lauderdale, FL, USA. (2003). ,(2003)
U. Ultes-Nitsche, C. Latze, Stronger authentication in e-commerce: how to protect even naïve user against phishing, pharming, and MITM attacks communication systems and networks. pp. 111- 116 ,(2007)
Bruce Schneier, Secrets and Lies Wiley-VCH. ,(2004)
Ryan Catherman, David Challener, David Safford, Leendert Van Doorn, Kent Yoder, A Practical Guide to Trusted Computing ,(2007)
M. Gittler, Pete Bramhall, Marco Casassa Mont, Joe Pato, M. Casassa Mont, Owen Rees, Mickey Gittler, P. Bramhall, Identity Management: a Key e-Business Enabler ,(2002)
Lee A. Bygrave, Privacy Protection in a Global Context- A Comparative Overview. Scandinavian studies in law. pp. 319- 348 ,(2004)
H. Jiang, Reliability, costs and delay performance of sending short message service in wireless systems ieee international conference on universal personal communications. ,vol. 2, pp. 1073- 1077 ,(1998) , 10.1109/ICUPC.1998.733668