5.00
Hdl Handle:
http://hdl.handle.net/10547/270612
Title:
Music is the key: using our enduring memory for songs to help users log on
Authors:
Gibson, Marcia; Renaud, Karen; Conrad, Marc; Maple, Carsten
Abstract:
Devising access control systems to support needs and capabilities of users, as well as the security requirements of organisations, is a key challenge faced in many of today’s business environments. If users are to behave securely, they must not be overburdened with unworkable authentication policies and methods. Yet the prevailing alphanumeric password can be a double-edged sword: secure passwords are inherently difficult to recall and vice-versa. Consequentially, a growing number of alternatives are emerging. In this chapter, the authors describe one novel scheme - a musical password. Musipass was designed with the user in mind and is tailored toward the task of authentication on the Web, where biometric and token-based systems have proved unsuccessful in replacing the flawed, yet prevalent traditional password. This chapter, which includes discussion on current thinking in the field of authentication, will be of interest to information managers, security practitioners, and HCI professionals.
Citation:
Gibson, M., Renaud K., Conrad, M., Maple, C. (2012) “Music is the key: Using our superior memory for songs to help users log on”, in: Gupta, M., Walp, J., Sharman, R. (eds), Strategic and Practical Approaches for Information Security Governance, ch.8, pages 137-157. Technology and Applied Solutions, IGI Global.
Publisher:
IGI Global
Issue Date:
2012
URI:
http://hdl.handle.net/10547/270612
DOI:
10.4018/978-1-4666-0197-0.ch008
Additional Links:
http://www.igi-global.com/book/strategic-practical-approaches-information-security/58283
Type:
Book chapter
Language:
en
ISBN:
9781466601970
Appears in Collections:
Centre for Research in Distributed Technologies (CREDIT)

Full metadata record

DC FieldValue Language
dc.contributor.authorGibson, Marciaen_GB
dc.contributor.authorRenaud, Karenen_GB
dc.contributor.authorConrad, Marcen_GB
dc.contributor.authorMaple, Carstenen_GB
dc.date.accessioned2013-02-28T09:47:04Z-
dc.date.available2013-02-28T09:47:04Z-
dc.date.issued2012-
dc.identifier.citationGibson, M., Renaud K., Conrad, M., Maple, C. (2012) “Music is the key: Using our superior memory for songs to help users log on”, in: Gupta, M., Walp, J., Sharman, R. (eds), Strategic and Practical Approaches for Information Security Governance, ch.8, pages 137-157. Technology and Applied Solutions, IGI Global.en_GB
dc.identifier.isbn9781466601970-
dc.identifier.doi10.4018/978-1-4666-0197-0.ch008-
dc.identifier.urihttp://hdl.handle.net/10547/270612-
dc.description.abstractDevising access control systems to support needs and capabilities of users, as well as the security requirements of organisations, is a key challenge faced in many of today’s business environments. If users are to behave securely, they must not be overburdened with unworkable authentication policies and methods. Yet the prevailing alphanumeric password can be a double-edged sword: secure passwords are inherently difficult to recall and vice-versa. Consequentially, a growing number of alternatives are emerging. In this chapter, the authors describe one novel scheme - a musical password. Musipass was designed with the user in mind and is tailored toward the task of authentication on the Web, where biometric and token-based systems have proved unsuccessful in replacing the flawed, yet prevalent traditional password. This chapter, which includes discussion on current thinking in the field of authentication, will be of interest to information managers, security practitioners, and HCI professionals.en_GB
dc.language.isoenen
dc.publisherIGI Globalen_GB
dc.relation.urlhttp://www.igi-global.com/book/strategic-practical-approaches-information-security/58283en_GB
dc.subjectsound based passwordsen_GB
dc.titleMusic is the key: using our enduring memory for songs to help users log onen
dc.typeBook chapteren
All Items in UOBREP are protected by copyright, with all rights reserved, unless otherwise indicated.