A Set of Heuristics for Usable Security and User Authentication

被引:4
|
作者
Realpe, Paulo C. [1 ]
Collazos, Cesar A. [1 ]
Hurtado, Julio [1 ]
Granollers, Antoni [2 ]
机构
[1] Univ Cauca, IDIS Res Grp, Popayan, Colombia
[2] Univ Lleida, GRIHO Res Grp, Lleida, Spain
关键词
Usable Security; heuristic; authentication; attribute; evaluation; design process;
D O I
10.1145/2998626.2998662
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, computer security is one of the most important tasks for supporting critical business process and protecting sensitive information. However, security problems for computer systems include vulnerabilities because they are hard to use and have poor user interfaces due to security constraints. Nowadays, finding a good trade-off between security and usability is a challenge, mainly for user authentication services. In this paper is presented a set of 153 heuristics as a tool to evaluate the grade of achievement in some applications according to security, usability and other characteristics for user authentication (e.g. performance, accessibility, operability and reliability). The main contribution of this work is to propose a possible standardization of these heuristics by formulating them in interrogative sentences to facilitate the evaluation of usable security and user authentication. Each heuristic is accompanied by comments that facilitate their evaluation.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] SNUXH: A Set of Social Network User Experience Heuristics
    Quinones, Daniela
    Rusu, Cristian
    Arancibia, Diego
    Gonzalez, Sebastian
    Saavedra, Maria Josee
    APPLIED SCIENCES-BASEL, 2020, 10 (18):
  • [22] A Set of Usability and User eXperience Heuristics for Social Networks
    Saavedra, Maria-Josee
    Rusu, Cristian
    Quinones, Daniela
    Roncagliolo, Silvana
    SOCIAL COMPUTING AND SOCIAL MEDIA: DESIGN, HUMAN BEHAVIOR AND ANALYTICS, SCSM 2019, PT I, 2019, 11578 : 128 - 139
  • [23] An Efficient Multistage Security System for User Authentication
    Gupta, Ashutosh
    Medhi, Prerna
    Pandey, Sujata
    Kumar, Pradeep
    Kumar, Saket
    Singh, H. P.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3194 - 3197
  • [24] Security Analysis on Remote User Authentication Methods
    Soni, Mukesh
    Patel, Tejas
    Jain, Anuj
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 506 - 513
  • [25] Biometric Authentication: System Security and User Privacy
    Jain, Anil K.
    Nandakumar, Karthik
    COMPUTER, 2012, 45 (11) : 87 - 92
  • [26] Security Analysis and Enhancements of a User Authentication Scheme
    Liu, Wan-Rong
    He, Xin
    Ji, Zhi-Yong
    International Journal of Network Security, 2021, 23 (05): : 895 - 903
  • [27] Security Analysis of Robust User Authentication Protocol
    Pura, Mihai-Lica
    Patriciu, Victor-Valeriu
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 457 - 460
  • [28] A Security Architecture Based on User Authentication of Bluetooth
    Xin, Yu
    Ting, Yan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 627 - +
  • [29] Biometric user authentication for heightened information security
    Xiao, QH
    BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3072 : 708 - 715
  • [30] A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones
    Papaioannou, Maria
    Pelekoudas-Oikonomou, Filippos
    Mantas, Georgios
    Serrelis, Emmanouil
    Rodriguez, Jonathan
    Fengou, Maria-Anna
    SENSORS, 2023, 23 (06)