메뉴 건너뛰기




Volumn , Issue , 2014, Pages 575-590

Password portfolios and the finite-effort user: Sustainably managing large numbers of accounts

Author keywords

[No Author keywords available]

Indexed keywords

FINANCIAL DATA PROCESSING; INVESTMENTS;

EID: 85076288823     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (90)

References (49)
  • 1
    • 85076286556 scopus 로고    scopus 로고
    • Stop. Think. Connect. http://www.stopthinkconnect.org/.
  • 3
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • December
    • A. Adams and M. A. Sasse. Users are not the enemy. CACM, pages 40-46, December 1999.
    • (1999) CACM , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 4
    • 71749099834 scopus 로고    scopus 로고
    • The economics of user effort in information security
    • October
    • A. Beautement and A. Sasse. The economics of user effort in information security. Computer Fraud & Security, pages 8-12, October 2009.
    • (2009) Computer Fraud & Security , pp. 8-12
    • Beautement, A.1    Sasse, A.2
  • 5
    • 70350697293 scopus 로고    scopus 로고
    • The compliance budget: Managing security behaviour in organisations
    • A. Beautement, M. Sasse, and M. Wonham. The Compliance Budget: Managing Security Behaviour in Organisations. In NSPW, 2008.
    • (2008) NSPW
    • Beautement, A.1    Sasse, M.2    Wonham, M.3
  • 8
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: Analyzing an anonymized corpus of 70 million passwords
    • J. Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords. In Proc. IEEE Symp. on Security and Privacy, pages 538-552, 2012.
    • (2012) Proc. IEEE Symp. On Security and Privacy , pp. 538-552
    • Bonneau, J.1
  • 9
    • 79958097346 scopus 로고    scopus 로고
    • The password thicket: Technical and market failures in human authentication on the web
    • J. Bonneau and S. Preibusch. The password thicket: Technical and market failures in human authentication on the web. In WEIS, 2010.
    • (2010) WEIS
    • Bonneau, J.1    Preibusch, S.2
  • 10
    • 85060180093 scopus 로고    scopus 로고
    • Towards reliable storage of 56-bit secrets in human memory
    • J. Bonneau and S. Schechter. Towards reliable storage of 56-bit secrets in human memory. In Proc. USENIX Security, 2014.
    • (2014) Proc. USENIX Security
    • Bonneau, J.1    Schechter, S.2
  • 13
    • 84977277570 scopus 로고    scopus 로고
    • W. Cheswick. Rethinking passwords. USENIX LISA, 2010. http://www.usenix.org/event/lisa10/tech/slides/cheswick.pdf.
    • (2010) Rethinking Passwords
    • Cheswick, W.1
  • 14
    • 84988000688 scopus 로고    scopus 로고
    • Rethinking passwords
    • W. Cheswick. Rethinking passwords. ACM Queue, 10(12):50-56, 2012.
    • (2012) ACM Queue , vol.10 , Issue.12 , pp. 50-56
    • Cheswick, W.1
  • 18
    • 85084161493 scopus 로고    scopus 로고
    • Deja vu: A user study using images for authentication
    • R. Dhamija and A. Perrig. Deja vu: a user study using images for authentication. In USENIX Security, 2000.
    • (2000) USENIX Security
    • Dhamija, R.1    Perrig, A.2
  • 20
    • 85076312615 scopus 로고    scopus 로고
    • Where do all the attacks go?
    • Fairfax, VA
    • D. Florêncio and C. Herley. Where Do All the Attacks Go? Proc. WEIS, 2011, Fairfax, VA.
    • (2011) Proc. WEIS
    • Florêncio, D.1    Herley, C.2
  • 21
    • 35348884906 scopus 로고    scopus 로고
    • A large-scale study of web password habits
    • D. Florêncio and C. Herley. A Large-Scale Study of Web Password Habits. Proc. WWW, 2007.
    • (2007) Proc. WWW
    • Florêncio, D.1    Herley, C.2
  • 22
    • 84865041518 scopus 로고    scopus 로고
    • Where do security policies come from?
    • D. Florêncio and C. Herley. Where Do Security Policies Come From? Proc. SOUPS, 2010.
    • (2010) Proc. SOUPS
    • Florêncio, D.1    Herley, C.2
  • 24
    • 35248846782 scopus 로고    scopus 로고
    • Password management strategies for online accounts
    • S. Gaw and E. Felten. Password Management Strategies for Online Accounts. In ACM SOUPS, 2006.
    • (2006) ACM SOUPS
    • Gaw, S.1    Felten, E.2
  • 26
    • 79957818269 scopus 로고    scopus 로고
    • Using and managing multiple passwords: A week to a view
    • B. Grawemeyer and H. Johnson. Using and managing multiple passwords: A week to a view. Interacting with Computers, 23(3):256-267, 2011.
    • (2011) Interacting with Computers , vol.23 , Issue.3 , pp. 256-267
    • Grawemeyer, B.1    Johnson, H.2
  • 28
    • 79958091082 scopus 로고    scopus 로고
    • A diary study of password usage in daily life
    • E. Hayashi and J. Hong. A diary study of password usage in daily life. In CHI (note), pages 2627-2630, 2011.
    • (2011) CHI (note) , pp. 2627-2630
    • Hayashi, E.1    Hong, J.2
  • 29
    • 77950877250 scopus 로고    scopus 로고
    • So long, and no thanks for the externalities: Rational rejection of security advice by users
    • C. Herley. So Long, And No Thanks for the Externalities: Rational Rejection of Security Advice by Users. Proc. NSPW, 2009.
    • (2009) Proc. NSPW
    • Herley, C.1
  • 30
    • 79952018667 scopus 로고    scopus 로고
    • Imperva. Consumer Password Worst Practices. 2010. http://www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf.
    • (2010) Consumer Password Worst Practices
  • 31
    • 77953963809 scopus 로고    scopus 로고
    • The true cost of unusable password policies: Password use in the wild
    • P. Inglesant and M. A. Sasse. The true cost of unusable password policies: Password use in the wild. In CHI, 2010.
    • (2010) CHI
    • Inglesant, P.1    Sasse, M.A.2
  • 32
    • 4243096135 scopus 로고    scopus 로고
    • The domino effect of password reuse
    • B. Ives, K. Walsh, and H. Schneider. The Domino Effect of Password Reuse. C. ACM, 47(4):75-78, 2004.
    • (2004) C. ACM , vol.47 , Issue.4 , pp. 75-78
    • Ives, B.1    Walsh, K.2    Schneider, H.3
  • 36
    • 85076299302 scopus 로고    scopus 로고
    • Forum (comment)
    • A. Karp. Forum (comment). C. ACM, 47(6):11-12, 2004.
    • (2004) C. ACM , vol.47 , Issue.6 , pp. 11-12
    • Karp, A.1
  • 38
    • 85076310190 scopus 로고    scopus 로고
    • Yahoo breach highlights password reuse threat
    • July 7
    • R. Lemos. Yahoo breach highlights password reuse threat. eWeek. July 7, 2012.
    • (2012) EWeek
    • Lemos, R.1
  • 40
    • 84995186518 scopus 로고
    • Portfolio selection
    • H. Markowitz. Portfolio selection. The Journal of Finance, 7(1):77-91, 1952.
    • (1952) The Journal of Finance , vol.7 , Issue.1 , pp. 77-91
    • Markowitz, H.1
  • 41
    • 85076286373 scopus 로고    scopus 로고
    • The password allocation problem
    • Nov. 4
    • R. Nithyanand and R. Johnson. The password allocation problem. In WPES, 2013. Nov. 4, 6 pages.
    • (2013) WPES
    • Nithyanand, R.1    Johnson, R.2
  • 43
    • 78650745563 scopus 로고    scopus 로고
    • The password game: Negative externalities from weak password practices
    • Springer Berlin Heidelberg
    • S. Preibusch and J. Bonneau. The password game: negative externalities from weak password practices. In Decision and Game Theory for Security, pages 192-207. Springer Berlin Heidelberg, 2010.
    • (2010) Decision and Game Theory for Security , pp. 192-207
    • Preibusch, S.1    Bonneau, J.2
  • 44
    • 39349101677 scopus 로고    scopus 로고
    • Password security: What users know and what they actually do
    • S. Riley. Password security: what users know and what they actually do. Usability News, 8(1), 2006.
    • (2006) Usability News , vol.8 , Issue.1
    • Riley, S.1
  • 45
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the "weakest link": A human-computer interaction approach to usable and effective security
    • M. Sasse, S. Brostoff, and D. Weirich. Transforming the "weakest link": a human-computer interaction approach to usable and effective security. BT Tech. J., 19(3):122-131, 2001.
    • (2001) BT Tech. J. , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.1    Brostoff, S.2    Weirich, D.3
  • 47
    • 84959159726 scopus 로고    scopus 로고
    • The password life cycle: User behaviour in managing passwords
    • E. Stobert and R. Biddle. The password life cycle: user behaviour in managing passwords. In Proc. SOUPS, 2014.
    • (2014) Proc. SOUPS
    • Stobert, E.1    Biddle, R.2
  • 48
    • 78650022232 scopus 로고    scopus 로고
    • Testing metrics for password creation policies by attacking large sets of revealed passwords
    • M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. ACM CCS, 2010.
    • (2010) Proc. ACM CCS
    • Weir, M.1    Aggarwal, S.2    Collins, M.3    Stern, H.4
  • 49
    • 78650011800 scopus 로고    scopus 로고
    • The security of modern password expiration: An algorithmic framework and empirical analysis
    • Y. Zhang, F. Monrose, and M. K. Reiter. The security of modern password expiration: An algorithmic framework and empirical analysis. In Proc. ACM CCS, 2010.
    • (2010) Proc. ACM CCS
    • Zhang, Y.1    Monrose, F.2    Reiter, M.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.