• Login
    View Item 
    •   Home
    • IRAC Institute for Research in Applicable Computing - to April 2016
    • Centre for Research in Distributed Technologies (CREDIT)
    • View Item
    •   Home
    • IRAC Institute for Research in Applicable Computing - to April 2016
    • Centre for Research in Distributed Technologies (CREDIT)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UOBREPCommunitiesTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartmentThis CollectionTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartment

    My Account

    LoginRegister

    About

    AboutLearning ResourcesResearch Graduate SchoolResearch InstitutesUniversity Website

    Statistics

    Display statistics

    Music is the key: using our enduring memory for songs to help users log on

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Authors
    Gibson, Marcia
    Renaud, Karen
    Conrad, Marc
    Maple, Carsten
    Issue Date
    2012
    Subjects
    sound based passwords
    
    Metadata
    Show full item record
    Abstract
    Devising access control systems to support needs and capabilities of users, as well as the security requirements of organisations, is a key challenge faced in many of today’s business environments. If users are to behave securely, they must not be overburdened with unworkable authentication policies and methods. Yet the prevailing alphanumeric password can be a double-edged sword: secure passwords are inherently difficult to recall and vice-versa. Consequentially, a growing number of alternatives are emerging. In this chapter, the authors describe one novel scheme - a musical password. Musipass was designed with the user in mind and is tailored toward the task of authentication on the Web, where biometric and token-based systems have proved unsuccessful in replacing the flawed, yet prevalent traditional password. This chapter, which includes discussion on current thinking in the field of authentication, will be of interest to information managers, security practitioners, and HCI professionals.
    Citation
    Gibson, M., Renaud K., Conrad, M., Maple, C. (2012) “Music is the key: Using our superior memory for songs to help users log on”, in: Gupta, M., Walp, J., Sharman, R. (eds), Strategic and Practical Approaches for Information Security Governance, ch.8, pages 137-157. Technology and Applied Solutions, IGI Global.
    Publisher
    IGI Global
    URI
    http://hdl.handle.net/10547/270612
    DOI
    10.4018/978-1-4666-0197-0.ch008
    Additional Links
    http://www.igi-global.com/book/strategic-practical-approaches-information-security/58283
    Type
    Book chapter
    Language
    en
    ISBN
    9781466601970
    ae974a485f413a2113503eed53cd6c53
    10.4018/978-1-4666-0197-0.ch008
    Scopus Count
    Collections
    Centre for Research in Distributed Technologies (CREDIT)

    entitlement

     
    DSpace software (copyright © 2002 - 2025)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.