A Secure Usability Design System for User Authentication

被引:0
|
作者
Olanrewaju, Ayannuga O. [1 ]
Olusegun, Folorunso [2 ]
Adio, Akinwale T. [2 ]
Asiribo, E. O. [3 ]
机构
[1] Yaba Coll Technol, Dept Comp Technol, Lagos, Nigeria
[2] Univ Agr Abeokuta, Dept Comp Sci, Abeokuta, Ogun State, Nigeria
[3] Univ Agr Abeokuta, Dept Stat, Abeokuta, Ogun State, Nigeria
关键词
Authentication; Graphical Password; Security; Text Password and Usability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The term usable authentication is been brought about as a result of issues surrounding user memorabiilty. Computer users find it less easy to memorize plain text password compared to images or graphics. Researchers have over the years presented several authentication schemes in an effort to provide users with a usable and yet secure authentication system. Authentication and usability are two important terms that to a large extent determines how good a security system is. Secure systems are often needed in many organizations to keep privacy, ensure data safety, among many others. Though it is a necessity for such systems to be very secure but one thing often neglected by most developers is the user. When a system is too secure that it often leads to circumventing of the system by the users, then such a system is not usable. This paper takes a close look at how usability and authentication can be balanced with the use of graphical passwords by presenting an authentication system that combines the use of text based password and graphics based password. The combined strengths of these schemes present computer users with a secure yet usable authentication scheme.
引用
收藏
页码:151 / 158
页数:8
相关论文
共 50 条
  • [1] On the Usability of User Interfaces for Secure Website Authentication in Browsers
    Pala, Massimiliano
    Wang, Yifei
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2010, 6391 : 239 - 254
  • [2] The secure DHCP system with user authentication
    Komori, T
    Saito, T
    LCN 2002: 27TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2002, : 123 - 131
  • [3] Robust biometric authentication system with a secure user template
    Ali, Syed Sadaf
    Baghel, Vivek Singh
    Ganapathi, Iyyakutti Iyappan
    Prakash, Surya
    IMAGE AND VISION COMPUTING, 2020, 104
  • [4] A Secure Remote User Authentication System - Digital Certificates
    Balakrishnan, Vimala
    Arabi, Hossein
    Lau, Siong-Hoe
    Teoh, Kung Keat
    CREATING GLOBAL ECONOMIES THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: THEORY & PRACTICE, VOLS 1-3, 2009, : 815 - 820
  • [5] The Authentication Game - Secure User Authentication by Gamification?
    Ebbers, Frank
    Brune, Philipp
    ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2016), 2016, 9694 : 101 - 115
  • [6] A usability based approach to designing continuous user biometric authentication system
    Dennis Mugambi Kaburu
    Julianne Sansa-Otim
    Kajumba Mayanja
    Drake Patrick Mirembe
    Tony Bulega
    Quality and User Experience, 2018, 3 (1)
  • [7] Usability of Authentication Mechanisms in Secure Messaging Applications
    Akman, Gamze
    Selcuk, Ali Aydin
    2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,
  • [8] Design of user authentication system based on WPKI
    Lee, Cheol-seung
    Kim, Hyeong-gyun
    Lee, Joon
    2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 979 - 983
  • [9] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [10] User Authentication to Access Secure Data
    Navratil, Pavel
    Slavicek, Karel
    Dostal, Otto
    CESNET CONFERENCE 2006: FIRST CESNET CONFERENCE ON ADVANCED COMMUNICATIONS AND GRIDS, 2006, : 127 - 132