A Set of Heuristics for Usable Security and User Authentication

被引:4
|
作者
Realpe, Paulo C. [1 ]
Collazos, Cesar A. [1 ]
Hurtado, Julio [1 ]
Granollers, Antoni [2 ]
机构
[1] Univ Cauca, IDIS Res Grp, Popayan, Colombia
[2] Univ Lleida, GRIHO Res Grp, Lleida, Spain
关键词
Usable Security; heuristic; authentication; attribute; evaluation; design process;
D O I
10.1145/2998626.2998662
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, computer security is one of the most important tasks for supporting critical business process and protecting sensitive information. However, security problems for computer systems include vulnerabilities because they are hard to use and have poor user interfaces due to security constraints. Nowadays, finding a good trade-off between security and usability is a challenge, mainly for user authentication services. In this paper is presented a set of 153 heuristics as a tool to evaluate the grade of achievement in some applications according to security, usability and other characteristics for user authentication (e.g. performance, accessibility, operability and reliability). The main contribution of this work is to propose a possible standardization of these heuristics by formulating them in interrogative sentences to facilitate the evaluation of usable security and user authentication. Each heuristic is accompanied by comments that facilitate their evaluation.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Exploring User-Centered Security Design for Usable Authentication Ceremonies
    Fassl, Matthias
    Grober, Lea Theresa
    Krombholz, Katharina
    CHI '21: PROCEEDINGS OF THE 2021 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2021,
  • [2] User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices
    Jeong, Jongkil Jay
    Shah, Syed Wajid Ali
    Nanda, Ashish
    Doss, Robin
    Nosouhi, Mohammad
    Webb, Jeb
    IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, 2024, 54 (05) : 554 - 564
  • [3] Examining usable security features and user perceptions of Physical Authentication Devices
    Nanda, Ashish
    Jeong, Jongkil Jay
    Shah, Syed Wajid Ali
    Nosouhi, Mohammad
    Doss, Robin
    COMPUTERS & SECURITY, 2024, 139
  • [4] Usable security: User preferences for authentication methods in eBanking and the effects of experience
    Weir, Catherine S.
    Douglas, Gary
    Richardson, Tim
    Jack, Mervyn
    INTERACTING WITH COMPUTERS, 2010, 22 (03) : 153 - 164
  • [5] Developing Accessible and Usable Security (ACCUS) Heuristics
    Napoli, Daniela
    CHI 2018: EXTENDED ABSTRACTS OF THE 2018 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2018,
  • [6] Usable User Authentication on a Smartwatch using Vibration
    Lee, Sunwoo
    Choi, Wonsuk
    Lee, Dong Hoon
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 304 - 319
  • [7] Passphrase and keystroke dynamics authentication: Usable security
    Bhana, Bhaveer
    Flowerday, Stephen
    COMPUTERS & SECURITY, 2020, 96
  • [8] EyeVeri: A Secure and Usable Approach for Smartphone User Authentication
    Song, Chen
    Wang, Aosen
    Ren, Kui
    Xu, Wenyao
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,
  • [9] An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010: 2011
    Realpe-Munoz, Paulo
    Collazos, Cesar A.
    Hurtado, Julio
    Granollers, Toni
    Velasco-Medina, Jaime
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST, 2016, 9750 : 65 - 76
  • [10] Seeing beyond visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices
    Rahman, Farzana
    Gani, Md Osman
    Ahsan, Golam Mushih Tanimul
    Ahamed, Sheikh Iqbal
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 121 - 129