TU Darmstadt / ULB / TUbiblio

Supporting Decision Makers in Choosing Suitable Authentication Schemes

Mayer, Peter ; Neumann, Stephan ; Storck, Daniel ; Volkamer, Melanie (2016)
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Frankfurt
Conference or Workshop Item, Bibliographie

Abstract

Despite its well-known deficiencies, the text password remains ubiquitous. Researchers previously suggested that this apparent conundrum was due to the complexity of choosing a suitable authentication scheme with respect to the desired application scenario. The plethora of alternatives can leave decision makers flummoxed and leads to their reaching for the familiar text password. To alleviate these difficulties, Renaud et al. suggested ACCESS (Authentication ChoiCE Support System), an abstract framework to support decision makers in this struggle. In this paper we present the first concrete realization of ACCESS. We create a knowledge base from the results of a literature review and present a technique which allows decision makers to specify their requirements effortlessly. The central contribution of this work is the realization of ACCESS’ feasibility analysis based on an adapted Analytic Hierarchy Process (AHP). This adaptation allows outsourcing the burden of knowing all authentication alternatives to experts, while keeping the complexity of the expert part as low as possible.

Item Type: Conference or Workshop Item
Erschienen: 2016
Creators: Mayer, Peter ; Neumann, Stephan ; Storck, Daniel ; Volkamer, Melanie
Type of entry: Bibliographie
Title: Supporting Decision Makers in Choosing Suitable Authentication Schemes
Language: English
Date: July 2016
Publisher: University of Plymouth
Book Title: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016)
Event Location: Frankfurt
Abstract:

Despite its well-known deficiencies, the text password remains ubiquitous. Researchers previously suggested that this apparent conundrum was due to the complexity of choosing a suitable authentication scheme with respect to the desired application scenario. The plethora of alternatives can leave decision makers flummoxed and leads to their reaching for the familiar text password. To alleviate these difficulties, Renaud et al. suggested ACCESS (Authentication ChoiCE Support System), an abstract framework to support decision makers in this struggle. In this paper we present the first concrete realization of ACCESS. We create a knowledge base from the results of a literature review and present a technique which allows decision makers to specify their requirements effortlessly. The central contribution of this work is the realization of ACCESS’ feasibility analysis based on an adapted Analytic Hierarchy Process (AHP). This adaptation allows outsourcing the burden of knowing all authentication alternatives to experts, while keeping the complexity of the expert part as low as possible.

Uncontrolled Keywords: Security, Usability and Society;Secure Data
Identification Number: TUD-CS-2016-0119
Divisions: LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
20 Department of Computer Science > SECUSO - Security, Usability and Society
Profile Areas > Cybersecurity (CYSEC)
LOEWE > LOEWE-Zentren
20 Department of Computer Science
Profile Areas
LOEWE
Date Deposited: 28 Jul 2016 18:35
Last Modified: 17 May 2018 13:02
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details