A Set of Heuristics for Usable Security and User Authentication

被引:4
|
作者
Realpe, Paulo C. [1 ]
Collazos, Cesar A. [1 ]
Hurtado, Julio [1 ]
Granollers, Antoni [2 ]
机构
[1] Univ Cauca, IDIS Res Grp, Popayan, Colombia
[2] Univ Lleida, GRIHO Res Grp, Lleida, Spain
关键词
Usable Security; heuristic; authentication; attribute; evaluation; design process;
D O I
10.1145/2998626.2998662
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, computer security is one of the most important tasks for supporting critical business process and protecting sensitive information. However, security problems for computer systems include vulnerabilities because they are hard to use and have poor user interfaces due to security constraints. Nowadays, finding a good trade-off between security and usability is a challenge, mainly for user authentication services. In this paper is presented a set of 153 heuristics as a tool to evaluate the grade of achievement in some applications according to security, usability and other characteristics for user authentication (e.g. performance, accessibility, operability and reliability). The main contribution of this work is to propose a possible standardization of these heuristics by formulating them in interrogative sentences to facilitate the evaluation of usable security and user authentication. Each heuristic is accompanied by comments that facilitate their evaluation.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Secure, Usable and Privacy-Friendly User Authentication from Keystroke Dynamics
    Halunen, Kimmo
    Vallivaara, Visa
    SECURE IT SYSTEMS, NORDSEC 2016, 2016, 10014 : 256 - 268
  • [32] Security enhancements of a remote user authentication scheme preserving user anonymity
    An, Younghwa
    Yang, Hyungkyu
    International Journal of Multimedia and Ubiquitous Engineering, 2013, 8 (01): : 129 - 138
  • [33] ECUXH: A Set of User eXperience Heuristics for e-Commerce
    Bascur, Camila
    Rusu, Cristian
    Quinones, Daniela
    SOCIAL COMPUTING AND SOCIAL MEDIA: EXPERIENCE DESIGN AND SOCIAL NETWORK ANALYSIS, SCSM 2021, PT I, 2021, 12774 : 407 - 420
  • [34] User Study, Analysis, and Usable Security of Passwords Based on Digital Objects
    Biddle, Robert
    Mannan, Mohammad
    van Oorschot, Paul C.
    Whalen, Tara
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 970 - 979
  • [35] US4USec: A User Story Model for Usable Security
    Gharib, Mohamad
    RESEARCH CHALLENGES IN INFORMATION SCIENCE, PT I, RCIS 2024, 2024, 513 : 257 - 272
  • [36] Security analysis of practical anonymous user authentication scheme with security proof
    Liu, Chenglian
    Lin, Changlu
    Sun, Shuliang
    Information Technology Journal, 2013, 12 (03) : 522 - 525
  • [37] Usable Security
    Wash, Rick
    Zurko, Mary Ellen
    IEEE INTERNET COMPUTING, 2017, 21 (03) : 19 - 21
  • [38] An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS
    Amin, Ruhul
    Biswas, G. P.
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
  • [39] A User Security Continuous Authentication Method for Earable Devices
    Wang, Yong
    Xiong, Yi
    Yang, Tianyu
    Shen, Yiran
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (11): : 2821 - 2834
  • [40] User perspective and security of a new mobile authentication method
    Laka, Pawel
    Mazurczyk, Wojciech
    TELECOMMUNICATION SYSTEMS, 2018, 69 (03) : 365 - 379