Filters








29 Hits in 5.7 sec

Tapas

Daniel McCarney, David Barrera, Jeremy Clark, Sonia Chiasson, Paul C. van Oorschot
2012 Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12  
To evaluate the viability of Tapas as an alternative to traditional password managers, we perform a 30 participant user study comparing Tapas to two configurations of Firefox's built-in password manager  ...  We further introduce Tapas, a concrete implementation of dual-possession authentication leveraging a desktop computer and a smartphone.  ...  We consider a specific instantiation of this type of manager, Tapas, 1 and present its design, implementation, and analysis.  ... 
doi:10.1145/2420950.2420964 dblp:conf/acsac/McCarneyBCCO12 fatcat:afy6zbmxd5ejrcvskzt57gf4re

BluePass: A Mobile Device Assisted Password Manager

Yue Li, Haining Wang, Kun Sun
2019 EAI Endorsed Transactions on Security and Safety  
However, state-ofthe-art cloud based password managers are vulnerable to data breach and a master password becomes a single point of failure.  ...  With the growing number of online accounts a user possesses, managing passwords has been unprecedentedly challenging. Password managers have emerged to help users managing their passwords.  ...  We implement a BluePass prototype in Android and Google Chrome platforms and evaluate its efficacy in terms of security, overhead, and usability.  ... 
doi:10.4108/eai.10-1-2019.156244 fatcat:cgenwvndavb5liq6su4yf2av7m

Automated Fine Grained Traceability Links Recovery between High Level Requirements and Source Code Implementations

Alejandro Velasco, Jairo Aponte
2020 ParadigmPlus  
In this work we propose a fine-grained traceability algorithm designed to recover traces between high level requirements written in human natural language and source code statements where they are implemented  ...  Software Traceability has been a matter of discussion in the Software Engineering community for a long time.  ...  Such control strategies range from verification of passwords and access codes to role management within the system.  ... 
doi:10.55969/paradigmplus.v1n2a2 fatcat:h6uqxvy5wfb25mp4yl7v3s4cpu

Authentication Melee

Scott Ruoti, Brent Roberts, Kent Seamons
2015 Proceedings of the 24th International Conference on World Wide Web - WWW '15  
Authentication Melee: A Usability Analysis of Seven Web Passwords continue to dominate the authentication landscape in spite of numerous proposals to replace them.  ...  Even though usability is a key factor in replacing passwords, very few alternatives have been subjected to formal usability studies and even fewer have been analyzed using a standard metric.  ...  [29] Daniel McCarney, David Barrera, Jeremy Clark, Sonia Chiasson, and Paul C van Oorschot. Tapas: Design, implementation, and usability evaluation of a password manager.  ... 
doi:10.1145/2736277.2741683 dblp:conf/www/RuotiRS15 fatcat:5ylifol4enh7xmjdqu65nfk6fi

Design and Implementation of a Service Provisioning Platform Using Smart Cards [chapter]

Vincent Guyot, Nadia Boukhatem
2006 Lecture Notes in Computer Science  
In this paper, we propose an autonomic service provisioning solution to mobile users and suggest the use of a smart card as an autonomy enabler.  ...  Service portability, adaptation and session mobility management is handled entirely by the smart card.  ...  This work provides a new solution for service provisioning to the mobile user by using a smart card. Our current implementation runs on laptops and workstations.  ... 
doi:10.1007/11880905_10 fatcat:v2oubt4t6jdptezlp4b3u2np4a

Cracking-Resistant Password Vaults Using Natural Language Encoders

Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart
2015 2015 IEEE Symposium on Security and Privacy  
Finally, we present, implement, and evaluate a full, NLE-based cracking-resistant vault system called NoCrack. IEEE Symposium on Security and Privacy  ...  We present an attack and supporting analysis showing that a previous design for cracking-resistant vaults-the only one of which we are aware-actually degrades security relative to conventional password-based  ...  We thank Michael Doescher for helping in several design choices of PCFG construction and cleaning the Pastebin dataset, Shoban Preeth Chandrabose for his feedback on the machine learning analysis of NoCrack  ... 
doi:10.1109/sp.2015.36 dblp:conf/sp/ChatterjeeBJR15 fatcat:opdswawyszdq5accuqmk3mnpea

Survey on delegated and self-contained authorization techniques in CPS and IoT

Sreelakshmi Vattaparambil Sudarsan, Olov Schelen, Ulf Bodin
2021 IEEE Access  
Authorization, therefore, plays a significant role in the trust management of autonomous devices and services.  ...  However, there is a need for a comprehensive review on different authorization techniques in Cyber Physical systems and Internet of Things.  ...  Skarmeta et al. (2014) [77] Design and evaluatio of a lightweight token along with ECDSA -N.  ... 
doi:10.1109/access.2021.3093327 fatcat:amkmt5e2hbdthhjzzi5bycjlia

Three laws for paperlessness

Harold Thimbleby
2019 Digital Health  
Successful paperlessness depends on user centred design and on quality implementation. 3. Plan for cultural change and moving goal posts.  ...  We are familiar with paper and rarely think much about it, except that in healthcare there seems to be too much of it, and it is slow, inefficient, and so old.  ...  , and having processes for post-market surveillance, managing security and passwords, and so forth.  ... 
doi:10.1177/2055207619827722 pmid:30719323 pmcid:PMC6348492 fatcat:mfg2e6dhkvhohij3mu2f5eipde

The end of the password era : towards password-less authentication based on enhanced FIDO

Mathias Bachl, Edgar Weippl, Katharina Krombholz-Reindl
2017
However, there are still a number of problems that need to be solved before FIDO can herald the end of the password era and become the standard authentication mechanism for the Internet of things.  ...  This thesis proposes both a usable solution for securing this communication channel, and an extension of the authentication protocol that allows to go without the direct interconnection at all.  ...  Weippl for his uncomplicated and flexible supervision throughout the entire time of creation of this thesis.  ... 
doi:10.34726/hss.2016.39549 fatcat:r2apclxnqbcdpior6tisizrpce

D5.4. Pilot evaluation report

Anna Matamala
2020 Zenodo  
This document provides an evaluation of the results of pilot and pre-pilot actions, differentiating between the actions in which the tools have been tested with professionals and the actions in which the  ...  Pilot operation plan and D5.2 Pilot evaluation methodology, under T5.1. Execution and evaluation plan.  ...  general branches, and 498 sessions from the Spanish pilot).  ... 
doi:10.5281/zenodo.6543911 fatcat:whdsfdwthnebxlbaxwphmplzry

Authentication Melee: A Usability Analysis of Seven Web Authentication Systems

Scott Ruoti, Scott Ruoti, Kent Seamons, Charles Knutson, Dan Olsen, Scott Ruoti
2015 All Theses and Dissertations   unpublished
Authentication Melee: A Usability Analysis of Seven Web Passwords continue to dominate the authentication landscape in spite of numerous proposals to replace them.  ...  Even though usability is a key factor in replacing passwords, very few alternatives have been subjected to formal usability studies and even fewer have been analyzed using a standard metric.  ...  [29] Daniel McCarney, David Barrera, Jeremy Clark, Sonia Chiasson, and Paul C van Oorschot. Tapas: Design, implementation, and usability evaluation of a password manager.  ... 
fatcat:nqdztf3srzb6zeybkgwmtk4s7a

Full Issue (23.1, Spring/Summer 2012)

Journal of Transportation Management Editors
2012 Journal of Transportation Management  
Acceptable articles could include conceptual, theoretical, legal, case, and applied research that contributes to better understanding and management of transportation and logistics.  ...  Acceptable topics for submission include, but are not limited to, broad logistics topics, logistics and transportation related legal issues, carrier management, shipper management of transportation functions  ...  In the designated data collection period, a total of 146 survey responses were received.  ... 
doi:10.22237/jotm/1333238880 fatcat:4qo3m2pk6bh5xo64kwli5gcda4

Bridging Socially Enhanced Virtual Communities

Venugopal Rao
2013 IOSR Journal of Computer Engineering  
The architecture of the proposed system is compromising of human activities and also automated activities and it is essentially a service oriented system.  ...  The communication and interactions across the companies has become a common phenomenon.  ...  First and foremost I would like to acknowledge the ongoing support of Dr. Sanjay Sharma and Prof. Akhilesh A. Waoo, Project Guide, BIST Bhopal in the design and implementation of the project.  ... 
doi:10.9790/0661-0940104 fatcat:zejgpenvqzb7rkchkznv5igfwm

Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices

Maliheh Shirvanian, Stanislaw Jarecki, Nitesh Saxena, Naveen Nathan
2014 Proceedings 2014 Network and Distributed System Security Symposium   unpublished
Utilizing these various communication settings we design, implement, and evaluate the performance of 13 different TFA mechanisms, and we analyze them with respect to security, usability (manual effort  ...  This motivates exploring different implementations of the D-to-C and C-to-  ...  PIN-Audio [24] and Tapas [21] use the phone as a mobile password manager that is used to store long and random passwords.  ... 
doi:10.14722/ndss.2014.23167 fatcat:ag7e4re5obazhegnfeahyxzkcu

Twelve Theses on Design Science Research in Information Systems [chapter]

Juhani Iivari
2010 Integrated Series in Information Systems  
At the end of some reviews there are a short evaluation of the article, its merits and shortcomings.  ...  Those comments may help a student to improve his/her ability himself/herself to read and evaluate other articles.  ...  Those request refer to evaluation of a new system, and evaluation is another main function of design science research .  ... 
doi:10.1007/978-1-4419-5653-8_5 fatcat:vfvlhzawrbgwvpr7bqmuj4pdye
« Previous Showing results 1 — 15 out of 29 results