A conceptual model for graphical authentication

Pierce, Justin D., Wells, Jason G., Warren, Matthew J. and Mackay, David R. 2003, A conceptual model for graphical authentication, in InfoSec03 : 1st Australian Information Security Management Conference, School of Information and Computer Management (SCISSEC research group), Edith Cowan University, Perth, W.A., pp. 1-8.

Attached Files
Name Description MIMEType Size Downloads

Title A conceptual model for graphical authentication
Author(s) Pierce, Justin D.
Wells, Jason G.
Warren, Matthew J.
Mackay, David R.
Conference name Australian Information Security Management Conference (1st : 2003 : Perth, Western Australia)
Conference location Perth, Western Australia
Conference dates 24 November 2003
Title of proceedings InfoSec03 : 1st Australian Information Security Management Conference
Editor(s) Croft, Laima
Knight, Shirlee-ann
Publication date 2003
Conference series Australian Information Security Management Conference
Start page 1
End page 8
Publisher School of Information and Computer Management (SCISSEC research group), Edith Cowan University
Place of publication Perth, W.A.
Keyword(s) password
authentication
security policy
network admmistration
information security
identity theft
Summary Reasons for the adoption of smart cards and biometric authentication mechanisms have been discussed in the past, yet many organisations are still resorting to traditional methods of authentication. Passwords possess several encumbrances not the least of which includes the difficulty some users have in remembering them. Often users inadvertently write difficult passwords down near the workstation, which negates any security password authentication, may provide and opens the floodgates to identity theft. In the current mainstream authentication paradigm, system administrators must ensure all users are educated on the need for a password policy, and implement it strictly. This paper discusses a conceptual framework for an alternative authentication paradigm. The framework attempts to reduce complexity for the user as well as increase security at the network and application levels.
Language eng
Field of Research 080499 Data Format not elsewhere classified
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2003, ACIS
Persistent URL http://hdl.handle.net/10536/DRO/DU:30005053

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 629 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jul 2008, 09:44:49 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.