ACCESS: Describing and Contrasting

Authentication Mechanisms
  • Karen Renaud
  • Melanie Volkamer
  • Joseph Maguire
Conference paper

DOI: 10.1007/978-3-319-07620-1_17

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8533)
Cite this paper as:
Renaud K., Volkamer M., Maguire J. (2014) ACCESS: Describing and Contrasting. In: Tryfonas T., Askoxylakis I. (eds) Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science, vol 8533. Springer, Cham

Abstract

The password the almost universal authentication solution yet is buckling under the strain. It demonstrates insufficiency and weakness due to poor choice, reuse and ease of transfer. Graphical passwords, biometrics, and hardware tokens have been suggested as alternatives. Industry has, unfortunately, not embraced these alternatives. One possible explanation is the complexity of the choice process. To support authentication decision-markers we suggest a framework called ACCESS (Authentication ChoiCE Support System) which captures requirements, consults a knowledge base of existing authentication mechanisms and their properties, and suggests those mechanisms that match the specified requirements.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Karen Renaud
    • 1
  • Melanie Volkamer
    • 2
  • Joseph Maguire
    • 1
  1. 1.University of GlasgowUK
  2. 2.TU DarmstadtGermany

Personalised recommendations