메뉴 건너뛰기




Volumn 1, Issue , 2010, Pages 383-392

The true cost of unusable password policies: Password use in the wild

Author keywords

password policy; passwords; usable security

Indexed keywords

CONTEXT OF USE; PASSWORD STRENGTH; SECURITY POLICY; STAFF MEMBERS; STRONG PASSWORD; USABLE SECURITY;

EID: 77953963809     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1753326.1753384     Document Type: Conference Paper
Times cited : (260)

References (23)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users Are Not the Enemy
    • December
    • Adams, A. and Sasse, M.A. Users Are Not The Enemy. Communications of the ACM 42, 12 (December 1999), 41-46.
    • (1999) Communications of the ACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 3
    • 77950564668 scopus 로고    scopus 로고
    • The Compliance Budget: Managing Security Behaviour in Organisations
    • ACM Press
    • Beautement, A., Sasse, M.A., and Wonham, M. The Compliance Budget: Managing Security Behaviour in Organisations. In Proc. NSPW 2008, ACM Press (2009), 47-58.
    • (2009) Proc. NSPW 2008 , pp. 47-58
    • Beautement, A.1    Sasse, M.A.2    Wonham, M.3
  • 4
    • 0242708756 scopus 로고    scopus 로고
    • Safe and Sound: A Safety-Critical Approach to Security
    • Brostoff, S. and Sasse, M.A. Safe and Sound: A Safety- Critical Approach to Security. In Proc. NSPW 2001 (2001), 41-50.
    • Proc. NSPW 2001 (2001) , pp. 41-50
    • Brostoff, S.1    Sasse, M.A.2
  • 5
    • 0033689778 scopus 로고    scopus 로고
    • A Diary Study of Information Capture in Working Life
    • ACM Press
    • Brown, B.A.T., Sellen, A.J., and O'Hara, K.P. A Diary Study of Information Capture in Working Life. In Proc. CHI 2000, ACM Press (2000), 438-445.
    • (2000) Proc. CHI 2000 , pp. 438-445
    • Brown, B.A.T.1    Sellen, A.J.2    O'Hara, K.P.3
  • 7
    • 84900482702 scopus 로고    scopus 로고
    • Security in the wild: User strategies for managing security as an everyday, practical problem
    • Dourish, P., Grinter, R.E., Delgado de la Flor, J., and Joseph, M. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 8, 6 (2004), 391-401.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 391-401
    • Dourish, P.1    Grinter, R.E.2    Delgado De La Flor, J.3    Joseph, M.4
  • 10
    • 35348884906 scopus 로고    scopus 로고
    • Large-Scale Study of Web Password Habits
    • ACM Press
    • Florêncio, D. and Herley, C.A. Large-Scale Study of Web Password Habits. In Proc. WWW 2007, ACM Press (2007), 657-666.
    • (2007) Proc. WWW 2007 , pp. 657-666
    • Florêncio, D.1    Herley, C.A.2
  • 11
    • 85044211678 scopus 로고    scopus 로고
    • Do Strong Web Passwords Accomplish Anything?
    • USENIX Association Article No. 10
    • Florêncio, D., Herley, C., and Coskun, B. Do Strong Web Passwords Accomplish Anything? In Proc. HotSec 07, USENIX Association (2007), Article No. 10.
    • (2007) Proc. HotSec 07
    • Florêncio, D.1    Herley, C.2    Coskun, B.3
  • 12
    • 77950877250 scopus 로고    scopus 로고
    • So Long and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users
    • Herley, C. So Long and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users. In NSPW 2009.
    • NSPW 2009
    • Herley, C.1
  • 13
    • 0018543411 scopus 로고
    • PASSWORD SECURITY: A CASE HISTORY
    • DOI 10.1145/359168.359172
    • Morris, R. and Thompson, K. Password security: a case history. Communications of the ACM 22, 11 (November 1979), 594-597. (Pubitemid 10431335)
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 15
    • 0037661108 scopus 로고    scopus 로고
    • Voice-Mail Diary Studies for Naturalistic Data Capture under Mobile Conditions
    • ACM Press
    • Palen, L. and Salzman, M. Voice-Mail Diary Studies for Naturalistic Data Capture under Mobile Conditions. In Proc. CSCW 2002, ACM Press (2002), 87-95.
    • (2002) Proc. CSCW 2002 , pp. 87-95
    • Palen, L.1    Salzman, M.2
  • 16
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
    • DOI 10.1023/A:1011902718709
    • Sasse, M.A., Brostoff, S., and Weirich, D. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technology Journal 19, 3 (July 2001), 122-131. (Pubitemid 32903117)
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 20
    • 35348928239 scopus 로고    scopus 로고
    • Password Sharing: Implications for Security Design Based on Social Practice
    • ACM Press
    • Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., and Furlong, M. Password Sharing: Implications for Security Design Based on Social Practice. In Proc. CHI 2007, ACM Press (2007), 895-904.
    • (2007) Proc. CHI 2007 , pp. 895-904
    • Singh, S.1    Cabraal, A.2    Demosthenous, C.3    Astbrink, G.4    Furlong, M.5
  • 21
    • 77953999893 scopus 로고    scopus 로고
    • Trust Economics. http://www.trust-economics.org/.
  • 22
    • 12844275960 scopus 로고    scopus 로고
    • Password Memorability and Security: Empirical Results
    • September/October
    • Yan, J., Blackwell, A., Anderson, R., and Grant, A. Password Memorability and Security: Empirical Results. IEEE Security & Privacy 2, 5 (September/October 2004), 25-31.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.5 , pp. 25-31
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.