Factors of password-based authentication

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS. This approach explored how authentication practices can be measured in three component areas: 1) password strength requirements, 2) password usage methods, and 3) password reset requirements. This report explores the criteria that are required to define these component areas.

    Original languageAmerican English
    Title of host publication19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World
    Subtitle of host publicationAnything, Anywhere, Anytime
    Pages1685-1693
    Number of pages9
    StatePublished - 2013
    Event19th Americas Conference on Information Systems, AMCIS 2013 - Chicago, IL, United States
    Duration: Aug 15 2013Aug 17 2013

    Publication series

    Name19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime
    Volume3

    Conference

    Conference19th Americas Conference on Information Systems, AMCIS 2013
    Country/TerritoryUnited States
    CityChicago, IL
    Period8/15/138/17/13

    ASJC Scopus Subject Areas

    • Computer Networks and Communications
    • Computer Science Applications
    • Information Systems
    • Library and Information Sciences

    Keywords

    • Authentication methods
    • Password authentication

    Fingerprint

    Dive into the research topics of 'Factors of password-based authentication'. Together they form a unique fingerprint.

    Cite this