Filters








1,943 Hits in 8.0 sec

Toward a secure and usable cloud-based password manager for web browsers

Rui Zhao, Chuan Yue
2014 Computers & security  
Fortunately, all the five most popular Web browsers have provided password managers as a useful built-in feature.  ...  Moreover, we propose a novel Cloud-based Storage-Free BPM (CSF-BPM) design to achieve a high level of security with the desired confidentiality, integrity, and availability properties.  ...  Acknowledgement The authors sincerely thank anonymous reviewers for their valuable suggestions and comments. This research was supported in part by the U.S.  ... 
doi:10.1016/j.cose.2014.07.003 fatcat:quzgsw6orbagppaldpahal3a6a

Toward Secure and Convenient Browsing Data Management in the Cloud

Chuan Yue
2013 USENIX Workshop on Hot Topics in Cloud Computing  
Cloud and Web-centric computing is a significant trend in computing.  ...  We also propose to explore a novel Cloud computing Age Browser (referred to as CAB) architecture that leverages the reliability and accessibility advantages of cloud storage services to fundamentally address  ...  Rui Zhao for helping verify the information presented in Table 1, and thanks Drs. Chunqiang Tang, Byung Chul Tak, and Ashish Kundu for their valuable feedback and discussion about this paper.  ... 
dblp:conf/hotcloud/Yue13 fatcat:weyt25qvxfga7j6vm47r2667iy

Evaluation of Professional Cloud Password Management Tools [chapter]

Daniel Schougaard, Nicola Dragoni, Angelo Spognardi
2016 Lecture Notes in Computer Science  
In this paper we review and analyze current professional password managers in the cloud.  ...  To help alleviate this problem, a new class of software grew popular: password managers. Since their introduction, password managers have slowly been migrating into the cloud.  ...  In particular, in this paper we consider and discuss functional and non-functional requirements for password manager services in the cloud; we survey and perform a usability and security assessment of  ... 
doi:10.1007/978-3-319-46963-8_2 fatcat:dlpfnvwztng27er5g7twtyijcm

Comparing Password Management Software: Toward Usable and Secure Enterprise Authentication

Patricia Arias-Cabarcos, Andres Marin, Diego Palacios, Florina Almenarez, Daniel Diaz-Sanchez
2016 IT Professional Magazine  
In this regard, though deploying a strong enterprise password policy is a mean to increase security against online breaches and data leaks, it also imposes a significant usability burden for users.  ...  To alleviate this problem, Password Managers (PMs) are pointed out as user-friendly tools that automate the processes of password generation and login. But how secure and usable are these tools?  ...  The goal of this paper is therefore to perform a comparative analysis, based on expert knowledge and empirical studies with users, and also to derive new directions towards secure and usable authentication  ... 
doi:10.1109/mitp.2016.81 fatcat:rbyxqakq65dlldtp62cjhpb3fi

Password Managers—It's All about Trust and Transparency

Fahad Alodhyani, George Theodorakopoulos, Philipp Reinecke
2020 Future Internet  
Our findings show that usability is not a major problem, rather lack of trust and transparency are the main reasons for the low adoption of password managers.  ...  Users of password managers have trust and security concerns, while there are a few issues with the user interfaces and functions of password managers.  ...  Acknowledgments: The authors would like to thank the 30 participants who took part in the usability test and interview study, as well as the 247 anonymous participants who completed the online questionnaire  ... 
doi:10.3390/fi12110189 fatcat:h2hkg6npyfgezhb3qct6k5vtxa

User Study on Single Password Authentication [article]

Devris Isler, Alptekin Küpçü, Aykut Coskun
2018 IACR Cryptology ePrint Archive  
In this paper, we implement two very different SPA systems and assess their usability with the following two comparative experiments: one comparing the state-of-the-art cloud-based browser-extension SPA  ...  Unlike classical password-based authentication systems, in SPA schemes the user is required to remember only a single password (and a username) for all her accounts, while the password is protected against  ...  Acknowledgements We thank Arjen Kılıç and İlker Kadir Öztürk for their efforts on implementation.  ... 
dblp:journals/iacr/IslerKC18 fatcat:2hvkctvqzbal5dvqawsguusami

BluePass: A Mobile Device Assisted Password Manager

Yue Li, Haining Wang, Kun Sun
2019 EAI Endorsed Transactions on Security and Safety  
However, state-ofthe-art cloud based password managers are vulnerable to data breach and a master password becomes a single point of failure.  ...  BluePass partially inherits the security characteristics of two-factor authentication by requiring both a mobile device and a master password to retrieve and decrypt the site passwords.  ...  However, a password manager has its own security and usability problem.  ... 
doi:10.4108/eai.10-1-2019.156244 fatcat:cgenwvndavb5liq6su4yf2av7m

Approaches to Curbing Data Breaches in Internet Banking based on Cloud computing

Okiyai Otieng, George Okeyo, Wilson Cheruiyot
2018 International Journal of Computer Applications  
Security, cloud computing and resource management  ...  Considering the confidentiality of this information, for instance passwords and bank accounts, banks need to identify, evaluate and solve distinct risks to security in regard to cloud computing in their  ...  Therefore, care is required for optimal web security and usability of the OTP system.  ... 
doi:10.5120/ijca2018917411 fatcat:wbs4ktxhi5cjdkizaxyhs76slm

A keyboard that manages your passwords in Android

Faysal Boukayoua, Bart De Decker, Vincent Naessens
2014 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)  
Unfortunately, when it comes to password management, users are confronted with greater security and usability concerns than in the non-mobile world.  ...  This work presents a password manager for Android that can accommodate any app. Existing platform mechanisms are leveraged to better protect against malware and device theft, than current solutions.  ...  Unlike browser-based solutions, our approach is not limited to the passwords of a single application. Ultimately, the barrier is lowered towards working with stronger, more differentiated passwords.  ... 
doi:10.1109/prisms.2014.6970592 dblp:conf/prisms/BoukayouaDN14 fatcat:aiay4y3tlrhudgajp2qp37uaai

Security and privacy considerations in digital death

Michael E. Locasto, Michael Massimi, Peter J. DePasquale
2011 Proceedings of the 2011 workshop on New security paradigms workshop - NSPW '11  
It examines the confluence of modern browser technology, cloud services, and human factors involved in managing a person's digital footprint while they live and retiring it when they die.  ...  We contemplate a potential approach to dealing with credentials after death by using cloud computing.  ...  Thanks also to the scribes for our session, Matt Bishop and Cormac Herley.  ... 
doi:10.1145/2073276.2073278 dblp:conf/nspw/LocastoMD11 fatcat:jrizrqix5rc5fevicoqnl7rzjq

Signing Cloud: Towards Qualified Electronic Signature Service in Cloud

Wojciech Kinastowski
2013 2013 IEEE 5th International Conference on Cloud Computing Technology and Science  
This paper covers the challenges in implementing a cloud-based digital signature service and, as a result, outlines cloud (Signing Cloud) that performs digital signature.  ...  New designs are desperately needed for qualified electronic signature to flourish. Cloud computing provides a new and promising opportunity for delivering electronic signatures as a service.  ...  To address this problem W3C Web Cryptography Working Group is working on Web Cryptography API. It should allow standardized, in-browser clients' encryption when communicating with a cloud.  ... 
doi:10.1109/cloudcom.2013.135 dblp:conf/cloudcom/Kinastowski13 fatcat:pshddekburhk7h3l65vzau63yi

Bootstrapping Adoption of the Pico Password Replacement System [chapter]

Frank Stajano, Graeme Jenkinson, Jeunese Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington
2014 Lecture Notes in Computer Science  
In previous work we presented Pico, an authentication system designed to be both more usable and more secure than passwords.  ...  Having broken the vicious circle we'll be in a stronger position to persuade providers to offer support for Pico in parallel with passwords.  ...  We also thank Roel Peeters et al. for their independent implementation of Pico and for sharing pre-publication drafts of their work "Towards Building the Pico: The Security Perspective" (still in submission  ... 
doi:10.1007/978-3-319-12400-1_17 fatcat:2nhvihycf5gihgv4pahy5ohncy

Embracing the cloud for better cyber security

Craig A. Shue, Brent Lagesse
2011 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
This trend toward cloud computing has a direct impact on cyber security: rather than securing user machines, preventing malware access, and managing removable media, a cloud-based security scheme must  ...  This change in approach will have profound implications for cyber security research efforts.  ...  The United States Government retains, and the publisher, by accepting this submission for publication, acknowledges that the United States Government retains, a nonexclusive, paid-up, irrevocable, worldwide  ... 
doi:10.1109/percomw.2011.5766877 dblp:conf/percom/ShueL11 fatcat:bh3s7h7p5nhhpbkujpzfryuczu

Why people (don't) use password managers effectively

Shikun Zhang, Sarah Pearman, Lujo Bauer, Nicolas Christin
2019 Symposium On Usable Privacy and Security  
Furthermore, past field data has indicated that users of built-in, browser-based password managers more often use weak and reused passwords than users of separate password managers that have password generation  ...  Our participants include users who use no password-specific tools at all, those who use password managers built into browsers or operating systems, and those who use separately installed password managers  ...  We would like to thank Chelse Swoopes and Soraya Alli for their assistance with the study design and the interviews.  ... 
dblp:conf/soups/ZhangPBC19 fatcat:cghfodflsvcp7e473zfbui7evm

Implementation of a Cloud-based Blood Pressure Data Management System

Mu-Hsing Kuo
2015 Studies in Health Technology and Informatics  
The objective of this study is to design and implement a cloud computing based blood pressure data management system that allows patients, nurses, physicians, and researchers to access data through the  ...  Regular monitoring of blood pressure of a patient can improve hypertension diagnosis and treatment.  ...  Conclusion In this study, we designed and implemented a cloud computing-based blood pressure data management system that allowed users to access, update and modify data through web interface browser anytime  ... 
pmid:25991282 fatcat:7peksb66kne2nbjqkenqw3niyy
« Previous Showing results 1 — 15 out of 1,943 results