A COMPARISON OF PASSWORD TECHNIQUES FOR MULTILEVEL AUTHENTICATION MECHANISMS

被引:58
作者
ZVIRAN, M
HAGA, WJ
机构
关键词
D O I
10.1093/comjnl/36.3.227
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Various mechanisms for authenticating users of computer-based information systems have been proposed. These include traditional, user-selected passwords, system-generated passwords, passphrases, cognitive passwords and associative passwords. While the mechanisms employed in primary passwords are determined by the operating systems' manufacturers, system designers can select any password mechanism for secondary passwords, to further protect sensitive applications and data files. This paper reports on the results of an empirically based study of passwords characteristics. It provides a comparative evaluation on the memorability and users' subjective preferences of the various passwords mechanisms, and suggests that cognitive passwords and associative passwords seem the most appropriate for secondary passwords.
引用
收藏
页码:227 / 237
页数:11
相关论文
共 21 条
[1]   VERIFYING THE AUTHENTICATION OF AN INFORMATION SYSTEM USER. [J].
Ahituv, Niv ;
Lapid, Yeheskel ;
Neumann, Seev .
Computers and Security, 1987, 6 (02) :152-157
[2]  
Avarne S., 1988, DATA PROCESSING COMM, V12, P16
[3]  
BARTON BF, 1988, COMPUTERS SECURITY, V3, P186
[4]  
FISHER RP, 1984, INFORMATION SYSTEMS
[5]  
Haga W.J., 1989, DATA PROCESSING COMM, P19
[6]  
Hoffman Lance J., 1977, MODERN METHODS COMPU
[7]  
Hsiao David K., 1979, COMPUTER SECURITY
[8]  
Jobusch D. L., 1989, Computers & Security, V8, P675, DOI 10.1016/0167-4048(89)90006-0
[9]  
Jobusch D. L., 1989, Computers & Security, V8, P587, DOI 10.1016/0167-4048(89)90051-5
[10]  
Kurzban S., 1983, Security IFIP/Sec '83. IFIP First Security Conference, P15