A Set of Heuristics for Usable Security and User Authentication

被引:4
|
作者
Realpe, Paulo C. [1 ]
Collazos, Cesar A. [1 ]
Hurtado, Julio [1 ]
Granollers, Antoni [2 ]
机构
[1] Univ Cauca, IDIS Res Grp, Popayan, Colombia
[2] Univ Lleida, GRIHO Res Grp, Lleida, Spain
关键词
Usable Security; heuristic; authentication; attribute; evaluation; design process;
D O I
10.1145/2998626.2998662
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, computer security is one of the most important tasks for supporting critical business process and protecting sensitive information. However, security problems for computer systems include vulnerabilities because they are hard to use and have poor user interfaces due to security constraints. Nowadays, finding a good trade-off between security and usability is a challenge, mainly for user authentication services. In this paper is presented a set of 153 heuristics as a tool to evaluate the grade of achievement in some applications according to security, usability and other characteristics for user authentication (e.g. performance, accessibility, operability and reliability). The main contribution of this work is to propose a possible standardization of these heuristics by formulating them in interrogative sentences to facilitate the evaluation of usable security and user authentication. Each heuristic is accompanied by comments that facilitate their evaluation.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Evolutionary Consideration on User Authentication: Security, Privacy, and Safety
    Vorakulpipat, Chalee
    Rattanalerdnusorn, Ekkachan
    IT PROFESSIONAL, 2021, 23 (05) : 38 - 43
  • [42] User perspective and security of a new mobile authentication method
    Pawel Laka
    Wojciech Mazurczyk
    Telecommunication Systems, 2018, 69 : 365 - 379
  • [43] Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices
    Papaioannou, Maria
    Mantas, Georgios
    Essop, Aliyah
    Sucasas, Victor
    Aaraj, Najwa
    Rodriguez, Jonathan
    2022 IEEE 27TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2022, : 173 - 178
  • [44] Practical anonymous user authentication scheme with security proof
    Chien, Hung-Yu
    COMPUTERS & SECURITY, 2008, 27 (5-6) : 216 - 223
  • [45] Security analysis and enhancements of a remote user authentication scheme
    Cao, Shou-Qi
    Sun, Qing
    Cao, Li-Ling
    International Journal of Network Security, 2019, 21 (04) : 661 - 669
  • [46] Classifying the Security Level of User Authentication for Secure Computing
    Shin, Jong-Whoi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (10): : 40 - 43
  • [47] Security enhancement for two remote user authentication schemes
    Peng, SH
    Han, Z
    Liu, JQ
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2628 - 2631
  • [48] An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS
    Ruhul Amin
    G. P. Biswas
    Journal of Medical Systems, 2015, 39
  • [49] Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Xiong, Hu
    Wang, Xiaofeng
    Li, Fagen
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 256 - 258
  • [50] A blockchain-based security system with light cryptography for user authentication security
    Hagui, Imen
    Msolli, Amina
    ben Henda, Noura
    Helali, Abdelhamid
    Gassoumi, Abdelaziz
    Nguyen, Thanh Phuong
    Hassen, Fredj
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (17) : 52451 - 52480