메뉴 건너뛰기




Volumn 46, Issue , 2014, Pages 32-47

Toward a secure and usable cloud-based password manager for web browsers

Author keywords

Cloud; Password manager; Security; Storage; User authentication; Web browser

Indexed keywords

AUTHENTICATION; CLOUDS; ENERGY STORAGE; MANAGERS; USER EXPERIENCE; WEBSITES;

EID: 84905241561     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2014.07.003     Document Type: Article
Times cited : (20)

References (74)
  • 1
    • 84905220771 scopus 로고    scopus 로고
    • 1Password
    • 1Password., https://agilebits.com/onepassword.
  • 2
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • A. Adams, and M.A. Sasse Users are not the enemy Commun ACM 42 12 1999 40 46
    • (1999) Commun ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 3
    • 0003508558 scopus 로고    scopus 로고
    • NIST FIPS 197
    • Advanced encryption standard (AES) 2001 NIST FIPS 197 http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
    • (2001) Advanced Encryption Standard (AES)
  • 6
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • M. Bishop, and D.V. Klein Improving system security via proactive password checking Comput Secur 14 3 1995 233 249
    • (1995) Comput Secur , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    Klein, D.V.2
  • 10
    • 85071440512 scopus 로고    scopus 로고
    • Halting password puzzles: Hard-to-break encryption from human-memorable keys
    • X. Boyen Halting password puzzles: hard-to-break encryption from human-memorable keys Proceedings of the USENIX Security Symposium 2007 119 134
    • (2007) Proceedings of the USENIX Security Symposium , pp. 119-134
    • Boyen, X.1
  • 22
    • 35348884906 scopus 로고    scopus 로고
    • A large-scale study of web password habits
    • DOI 10.1145/1242572.1242661, 16th International World Wide Web Conference, WWW2007
    • D. Florêncio, and C. Herley A large-scale study of web password habits Proceedings of the International Conference on World Wide Web (WWW) 2007 657 666 (Pubitemid 47582295)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 657-666
    • Florencio, D.1    Herley, C.2
  • 26
    • 84905274762 scopus 로고    scopus 로고
    • Breaking our password hash habit - Why the sharing of users' password choices for defensive analysis is an underprovisioned social good, and what we can do to encourage it
    • C. Herley, and S. Schechter Breaking our password hash habit - why the sharing of users' password choices for defensive analysis is an underprovisioned social good, and what we can do to encourage it Proceedings of the Workshop on the Economics of Information Security (WEIS) 2013
    • (2013) Proceedings of the Workshop on the Economics of Information Security (WEIS)
    • Herley, C.1    Schechter, S.2
  • 27
    • 84859800820 scopus 로고    scopus 로고
    • A research agenda acknowledging the persistence of passwords
    • C. Herley, and P.C. van Oorschot A research agenda acknowledging the persistence of passwords IEEE Secur Priv 10 1 2012 28 36
    • (2012) IEEE Secur Priv , vol.10 , Issue.1 , pp. 28-36
    • Herley, C.1    Van Oorschot, P.C.2
  • 34
    • 0033719386 scopus 로고    scopus 로고
    • Risks of the passport single signon protocol
    • D.P. Kormann, and A.D. Rubin Risks of the passport single signon protocol Comput Netw 33 1-6 2000 51 58
    • (2000) Comput Netw , vol.33 , Issue.16 , pp. 51-58
    • Kormann, D.P.1    Rubin, A.D.2
  • 37
    • 84872407214 scopus 로고    scopus 로고
    • Likert scale, http://en.wikipedia.org/wiki/Likert-scale.
    • Likert Scale
  • 38
    • 48349087157 scopus 로고    scopus 로고
    • Enhancing web browser security against malware extensions
    • M.T. Louw, J.S. Lim, and V.N. Venkatakrishnan Enhancing web browser security against malware extensions J Comput Virology 4 3 2008 179 195
    • (2008) J Comput Virology , vol.4 , Issue.3 , pp. 179-195
    • Louw, M.T.1    Lim, J.S.2    Venkatakrishnan, V.N.3
  • 41
    • 0018543411 scopus 로고
    • Password security: A case history
    • R. Morris, and K. Thompson Password security: a case history Commun ACM 22 11 1979 594 597
    • (1979) Commun ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 43
    • 84893634551 scopus 로고    scopus 로고
    • NIST: Secure hashing, http://csrc.nist.gov/groups/ST/toolkit/secure-hashing.html.
    • NIST: Secure Hashing
  • 49
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir How to share a secret Commun ACM 22 11 1979 612 613
    • (1979) Commun ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 50
  • 60
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou Toward secure and dependable storage services in cloud computing IEEE Trans Serv Comput. 5 2 2012 220 232
    • (2012) IEEE Trans Serv Comput. , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 61
    • 84878355933 scopus 로고    scopus 로고
    • Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
    • R. Wang, S. Chen, and X. Wang Signing me onto your accounts through facebook and google: a traffic-guided security study of commercially deployed single-sign-on web services Proceedings of the IEEE Symposium on Security and Privacy 2012
    • (2012) Proceedings of the IEEE Symposium on Security and Privacy
    • Wang, R.1    Chen, S.2    Wang, X.3
  • 63
    • 82655182931 scopus 로고    scopus 로고
    • Windows azure storage: A highly available cloud storage service with strong consistency
    • Windows Azure Storage Team Windows azure storage: a highly available cloud storage service with strong consistency Proceedings of the ACM Symposium on Operating Systems Principles (SOSP) 2011
    • (2011) Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
  • 64
    • 84905220769 scopus 로고    scopus 로고
    • Windows CryptProtectData function, http://msdn.microsoft.com/en-us/library/windows/desktop/aa380261(v=vs.85).aspx.
    • Dows CryptProtectData Function
  • 65
  • 67
    • 34250786200 scopus 로고    scopus 로고
    • Web wallet: Preventing phishing attacks by revealing user intentions
    • DOI 10.1145/1143120.1143133, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
    • M. Wu, R.C. Miller, and G. Little Web wallet: preventing phishing attacks by revealing user intentions Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2006 102 113 (Pubitemid 46966973)
    • (2006) ACM International Conference Proceeding Series , vol.149 , pp. 102-113
    • Wu, M.1    Miller, R.C.2    Little, G.3
  • 70
    • 12844275960 scopus 로고    scopus 로고
    • Password memorability and security: Empirical results
    • DOI 10.1109/MSP.2004.81
    • J. Yan, A. Blackwell, R. Anderson, and A. Grant Password memorability and security: empirical results IEEE Secur Priv 2 5 2004 25 31 (Pubitemid 40168623)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 25-31
    • Yan, J.1    Alan, B.2    Anderson, R.3    Grant, A.4
  • 71
    • 34250747969 scopus 로고    scopus 로고
    • Passpet: Convenient password management and phishing protection
    • DOI 10.1145/1143120.1143126, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
    • K.-P. Yee, and K. Sitaker Passpet: convenient password management and phishing protection Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2006 32 43 (Pubitemid 46966967)
    • (2006) ACM International Conference Proceeding Series , vol.149 , pp. 32-43
    • Yee, K.-P.1    Sitaker, K.2
  • 74
    • 84905252411 scopus 로고    scopus 로고
    • Vulnerability and risk analysis of two commercial browser and cloud based password managers
    • R. Zhao, C. Yue, and K. Sun Vulnerability and risk analysis of two commercial browser and cloud based password managers ASE Sci J 1 4 2013 1 15
    • (2013) ASE Sci J , vol.1 , Issue.4 , pp. 1-15
    • Zhao, R.1    Yue, C.2    Sun, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.