메뉴 건너뛰기




Volumn 8, Issue 4, 2009, Pages 275-289

A comprehensive simulation tool for the analysis of password policies

Author keywords

Management; Password; Policy; Simulation

Indexed keywords

HUMAN STUDY; HUMAN USERS; PASSWORD; POLICY; POLICY FACTORS; POLICY SIMULATION; SIMULATION; SIMULATION TOOL;

EID: 68449088124     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-009-0084-3     Document Type: Article
Times cited : (24)

References (13)
  • 1
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • Bishop M., V.Klein D.: Improving system security via proactive password checking. Comput. Secur. 14 (3), 233-249 (1995)
    • (1995) Comput. Secur. , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    V.Klein, D.2
  • 4
    • 31644436198 scopus 로고    scopus 로고
    • Office workers give away passwords for a cheap pen
    • Leyden, J.: Office workers give away passwords for a cheap pen. The Register (2003). http://www.theregister.co.uk/2003/04/18/ office_workers_give_away_passwords/
    • (2003) The Register
    • Leyden, J.1
  • 5
    • 0036559882 scopus 로고    scopus 로고
    • Improving computer security for authentication of users: Influence of proactive password restrictions
    • Proctor R.W., Lien M.C., Vu K.P.L., Schultz E.E., Salvendy G.: Improving computer security for authentication of users: Influence of proactive password restrictions. Behav. Res. Methods Instrum. Comput. 34 (2), 163-169 (2002)
    • (2002) Behav. Res. Methods Instrum. Comput. , vol.34 , Issue.2 , pp. 163-169
    • Proctor, R.W.1    Lien, M.C.2    Vu, K.P.L.3    Schultz, E.E.4    Salvendy, G.5
  • 8
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
    • doi: 10.1023/A:1011902718709
    • Sasse M.A., Brostoff S., Weirich D.: Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technol. J. 19 (3), 122-131 (2001). doi: 10.1023/A:1011902718709
    • (2001) BT Technol. J. , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 9
    • 84944486544 scopus 로고
    • Prediction and entropy of printed English
    • Shannon C.E.: Prediction and entropy of printed English. Bell Syst. Tech. J. 30, 50-64 (1951)
    • (1951) Bell Syst. Tech. J. , vol.30 , pp. 50-64
    • Shannon, C.E.1
  • 13
    • 0242708748 scopus 로고    scopus 로고
    • A note on proactive password checking
    • In: ACM Press, New York doi: 10.1145/508171.508194
    • Yan, J.J.: A note on proactive password checking. In: NSPW '01: Proceedings of the 2001 Workshop on New Security Paradigms, pp. 127-135. ACM Press, New York (2001). doi: 10.1145/508171.508194
    • (2001) NSPW '01: Proceedings of the 2001 Workshop on New Security Paradigms , pp. 127-135
    • Yan, J.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.