메뉴 건너뛰기




Volumn 92, Issue 9, 2007, Pages 1204-1217

A process for supporting risk-aware web authentication mechanism choice

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA REDUCTION; USER INTERFACES; WEBSITES;

EID: 33847401100     PISSN: 09518320     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ress.2006.08.008     Document Type: Article
Times cited : (9)

References (50)
  • 1
    • 33847350769 scopus 로고    scopus 로고
    • Fox S, Anderson JQ, Rainie L. The future of the internet. Technical report, Pew Internet and American life project, 〈http://www.pewinternet.org/pdfs/PIP_Future_of_Internet.pdf〉; 2005 [Accessed May 2006].
  • 2
    • 33847342191 scopus 로고    scopus 로고
    • Joyce E. Amazon's profit jumps, but it eases outlook, 〈internetnews.com〉; [21 October 2004].
  • 3
    • 33847369121 scopus 로고    scopus 로고
    • DTI. Information security factsheet, 〈http://www.dti.gov.uk/bestpractice/assets/security/intro-to-info.pdf〉; 2005.
  • 4
    • 33847371305 scopus 로고    scopus 로고
    • Deliotte. Global security survey 〈http://www.ladlass.com/ice/archives/files/deliotte〉.
  • 5
    • 33847418482 scopus 로고    scopus 로고
    • Hills S. Millions 'are wide open to online crime', Metro; 28 October 2005.
  • 6
    • 33847347389 scopus 로고    scopus 로고
    • Rash W. Password chaos threatens e-commerce; 15 February 2002.
  • 7
    • 33847367341 scopus 로고    scopus 로고
    • Schneier B. Cryptogram newsletter, 〈http://www.schneier.com〉; September 2005.
  • 8
    • 27644524446 scopus 로고    scopus 로고
    • Bridging the gap between software development and information security
    • van Wyk K.R., and McGraw G. Bridging the gap between software development and information security. IEEE Secur Privacy 3 5 (2005) 75-79
    • (2005) IEEE Secur Privacy , vol.3 , Issue.5 , pp. 75-79
    • van Wyk, K.R.1    McGraw, G.2
  • 10
    • 0019146023 scopus 로고
    • Risks of risk decisions
    • Starr C., and Whipple C. Risks of risk decisions. Science 208 (1980) 1114-1119
    • (1980) Science , vol.208 , pp. 1114-1119
    • Starr, C.1    Whipple, C.2
  • 11
    • 33847422385 scopus 로고    scopus 로고
    • Risk assessment: report of a royal society study group. London; The Royal Society. 1983.
  • 12
    • 33847395066 scopus 로고    scopus 로고
    • Adams J. Risk. University College London; 1995.
  • 13
    • 0003020377 scopus 로고
    • The emergence of risk communication studies: social and political context
    • Plough A., and Krimsky S. The emergence of risk communication studies: social and political context. Sci Technol Hum Values 12 3-4 (1987) 4-10
    • (1987) Sci Technol Hum Values , vol.12 , Issue.3-4 , pp. 4-10
    • Plough, A.1    Krimsky, S.2
  • 14
    • 0000866989 scopus 로고    scopus 로고
    • Comparing risks thoughtfully
    • Finkel A.M. Comparing risks thoughtfully. Risk 7 4 (1996) 325-359
    • (1996) Risk , vol.7 , Issue.4 , pp. 325-359
    • Finkel, A.M.1
  • 15
    • 84991269825 scopus 로고    scopus 로고
    • Quality time: the fundamentals of information-security
    • Pfleeger C.P. Quality time: the fundamentals of information-security. IEEE Software 14 1 (1997) 15-16,60
    • (1997) IEEE Software , vol.14 , Issue.1
    • Pfleeger, C.P.1
  • 17
    • 33847395946 scopus 로고    scopus 로고
    • Alberts CJ, Behrens AG, Pethia RD, Wilson WR. Operationally critical threat, asset and vulnerability evaluation (octave) framework. Technical report CMU/SEI-99-TR-017, version 1.0, Carnegie Mellon University Software Engineering Institute, 〈http://www.sei.cmu.edu/pub/documents/99.reports/pdf/99tr017.pdf〉; June 1999.
  • 18
    • 33847353907 scopus 로고    scopus 로고
    • Threat agents: what infosec officers need to know
    • Vidalis S., and Jones A. Threat agents: what infosec officers need to know. Mediterr J Comput Networks 1 2 (2005) 97-110
    • (2005) Mediterr J Comput Networks , vol.1 , Issue.2 , pp. 97-110
    • Vidalis, S.1    Jones, A.2
  • 19
    • 85055233227 scopus 로고    scopus 로고
    • Auerbach, Philadelphia, PA 〈http://www.peltierassociates.com/frap.htm〉
    • Peltier T.R. Information security risk analysis (2005), Auerbach, Philadelphia, PA. http://www.peltierassociates.com/frap.htm 〈http://www.peltierassociates.com/frap.htm〉
    • (2005) Information security risk analysis
    • Peltier, T.R.1
  • 20
    • 0031597183 scopus 로고    scopus 로고
    • Briand LC, Emam KE, Bomarius F. Cobra: a hybrid method for software COst estimation, benchmarking, and risk assessment. In: Twentieth international conference on software engineering (ICSE'98); 1998. p. 390 〈http://www.riskworld.net/index.htm〉.
  • 21
    • 33847378586 scopus 로고    scopus 로고
    • American Chemical Society. Understanding risk analysis. A short guide for health, safety, and environmental policy making, 〈http://www.rff.org/rff/Publications/loader.cfm?url=/commonspot/security%/getfile.cfm{minus 45 degree rule}&PageID=14418〉; 1998.
  • 22
    • 33847366345 scopus 로고    scopus 로고
    • Measuring ROI on security
    • Tipton H.F., and Krause M. (Eds), Auerbach Publications, Philadelphia, PA
    • Endorf C.F. Measuring ROI on security. In: Tipton H.F., and Krause M. (Eds). Information security management handbook. 5th ed. (2004), Auerbach Publications, Philadelphia, PA 685-688
    • (2004) Information security management handbook. 5th ed. , pp. 685-688
    • Endorf, C.F.1
  • 28
    • 33847356596 scopus 로고    scopus 로고
    • Outsourcing security
    • Tipton H.F., and Krause M. (Eds), Auerbach, Philadelphia, PA
    • Tiller J.S. Outsourcing security. In: Tipton H.F., and Krause M. (Eds). Information security management handbook. 5th Ed. (2004), Auerbach, Philadelphia, PA 1061-1072
    • (2004) Information security management handbook. 5th Ed. , pp. 1061-1072
    • Tiller, J.S.1
  • 30
    • 33847367815 scopus 로고    scopus 로고
    • Greene A. A process approach to project risk management. In: Doctoral research workshop: construction process research, Loughborough University; 2000. p. 14-25.
  • 31
    • 0033178111 scopus 로고    scopus 로고
    • Trust, emotion, sex, politics and science: surveying the risk-assessment battlefield
    • Slovic P. Trust, emotion, sex, politics and science: surveying the risk-assessment battlefield. Risk Anal 19 4 (1999) 689-701
    • (1999) Risk Anal , vol.19 , Issue.4 , pp. 689-701
    • Slovic, P.1
  • 32
    • 19944372131 scopus 로고    scopus 로고
    • Is a picture really worth a thousand words? Reflecting on the usability of graphical authentication systems
    • [special issue]
    • De Angeli A., Coventry L., Johnson G., and Renaud K. Is a picture really worth a thousand words? Reflecting on the usability of graphical authentication systems. Int J Human-Comput Stud HCI research on Privacy and Security 63 1-2 (2005) 128-152 [special issue]
    • (2005) Int J Human-Comput Stud HCI research on Privacy and Security , vol.63 , Issue.1-2 , pp. 128-152
    • De Angeli, A.1    Coventry, L.2    Johnson, G.3    Renaud, K.4
  • 34
    • 4243096135 scopus 로고    scopus 로고
    • The domino effect of password reuse
    • Ives B., Walsh K.R., and Schneider H. The domino effect of password reuse. Commun ACM 47 4 (2004) 75-78
    • (2004) Commun ACM , vol.47 , Issue.4 , pp. 75-78
    • Ives, B.1    Walsh, K.R.2    Schneider, H.3
  • 35
    • 33847338583 scopus 로고    scopus 로고
    • Braghin C. Biometric authentication, 〈http://citeseer.ist.psu.edu/436492.html〉; November 2000 [Accessed 13 April 2005].
  • 36
    • 84962052143 scopus 로고    scopus 로고
    • Identity theft, social security numbers, and the web
    • Berghel H. Identity theft, social security numbers, and the web. CACM 43 2 (2000) 17-21
    • (2000) CACM , vol.43 , Issue.2 , pp. 17-21
    • Berghel, H.1
  • 38
    • 0003429117 scopus 로고    scopus 로고
    • Are passfaces more usable than passwords? A field trial investigation
    • McDonald S. (Ed), Springer, Berlin
    • Brostoff S., and Sasse A. Are passfaces more usable than passwords? A field trial investigation. In: McDonald S. (Ed). People and computers XIV-usability or else! Proceedings of HCI 2000 (2000), Springer, Berlin 405-424
    • (2000) People and computers XIV-usability or else! Proceedings of HCI 2000 , pp. 405-424
    • Brostoff, S.1    Sasse, A.2
  • 39
    • 85084161493 scopus 로고    scopus 로고
    • Déjà vu: a user study using images for authentication
    • Denver, Colorado
    • Dhamija R., and Perrig A. Déjà vu: a user study using images for authentication. Proceedings of USENIX security symposium (2000), Denver, Colorado 45-58
    • (2000) Proceedings of USENIX security symposium , pp. 45-58
    • Dhamija, R.1    Perrig, A.2
  • 41
    • 33847389874 scopus 로고    scopus 로고
    • Blonder GE. Graphical password. United States Patent 5559961; 1996.
  • 42
    • 9944240263 scopus 로고    scopus 로고
    • My password is here! Investigating authentication schemes based on visuo-spatial memory
    • Renaud K.V., and De Angeli A. My password is here! Investigating authentication schemes based on visuo-spatial memory. Interacting Comput 16 6 (2004) 1017-1041
    • (2004) Interacting Comput , vol.16 , Issue.6 , pp. 1017-1041
    • Renaud, K.V.1    De Angeli, A.2
  • 43
    • 33847390416 scopus 로고    scopus 로고
    • Jermyn I, Mayer A, Monrose F, Reoter MK, Rubin AD. The design and analysis of graphical passwords. In: Proceedings of the ninth USENIX security symposium; 2000. Electronic proceedings 〈http://www.usenix.org/publications/library/proceedings/sec2000/technica%l.html〉.
  • 44
    • 85084163855 scopus 로고    scopus 로고
    • Thorpe J, van Oorschot P. Graphical dictionaries and the memorable space of graphical passwords. In: Thirteenth USENIX security symposium; 2004. p. 135-50.
  • 45
    • 79959966395 scopus 로고    scopus 로고
    • Renaud K. A visuo-biometric authenticaton mechanism for older users. In: Proceedings of the British HCI 2005. Edinburgh; September 5-9, 2005. p. 167-82.
  • 46
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • O'Gorman L. Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE 91 12 (2003) 2019-2040
    • (2003) Proceedings of the IEEE , vol.91 , Issue.12 , pp. 2019-2040
    • O'Gorman, L.1
  • 47
    • 33847357415 scopus 로고    scopus 로고
    • IASEP, Data security protocol for education. Center for Information Assurance and Security and the Indiana Assessment System of Education Proficiencies. Purdue Research Foundation 〈http://iasep.soe.purdue.edu/Protocol/home_page.htm〉; September 2000.
  • 48
    • 33847379033 scopus 로고    scopus 로고
    • Miller JC. Risk assessment for your web site. IRMI.com, International Risk Management Institute 〈http://www.irmi.com/Expert/Articles/2000/Schoenfeld.aspx〉; September 2000.
  • 49
    • 33847421933 scopus 로고    scopus 로고
    • Blaze M. Safecracking for the computer scientist. Technical report, CIS Department, University of Pennsylvania; 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.