Chapter

Human Aspects of Information Security, Privacy, and Trust

Volume 8533 of the series Lecture Notes in Computer Science pp 183-194

ACCESS: Describing and Contrasting

Authentication Mechanisms
  • Karen RenaudAffiliated withUniversity of Glasgow
  • , Melanie VolkamerAffiliated withTU Darmstadt
  • , Joseph MaguireAffiliated withUniversity of Glasgow

* Final gross prices may vary according to local VAT.

Get Access

Abstract

The password the almost universal authentication solution yet is buckling under the strain. It demonstrates insufficiency and weakness due to poor choice, reuse and ease of transfer. Graphical passwords, biometrics, and hardware tokens have been suggested as alternatives. Industry has, unfortunately, not embraced these alternatives. One possible explanation is the complexity of the choice process. To support authentication decision-markers we suggest a framework called ACCESS (Authentication ChoiCE Support System) which captures requirements, consults a knowledge base of existing authentication mechanisms and their properties, and suggests those mechanisms that match the specified requirements.