Fourth-factor authentication
العنوان: | Fourth-factor authentication |
---|---|
المؤلفون: | Moti Yung, Ronald L. Rivest, John G. Brainard, Ari Juels, Michael Szydlo |
المصدر: | ACM Conference on Computer and Communications Security |
بيانات النشر: | ACM, 2006. |
سنة النشر: | 2006 |
مصطلحات موضوعية: | Challenge-Handshake Authentication Protocol, Computer access control, Computer science, media_common.quotation_subject, Internet privacy, Access control, Cryptography, Security token, Computer security, computer.software_genre, Generic Bootstrapping Architecture, Lightweight Extensible Authentication Protocol, media_common, Password, Password policy, Authentication, Delegation, business.industry, Software token, Multi-factor authentication, Chip Authentication Program, Network Access Control, Authentication protocol, Challenge–response authentication, business, computer |
الوصف: | User authentication in computing systems traditionally depends on three factors: something you have (e.g., a hardware token), something you are (e.g., a fingerprint), and something you know (e.g., a password). In this paper, we explore a fourth factor, the social network of the user, that is, somebody you know.Human authentication through mutual acquaintance is an age-old practice. In the arena of computer security, it plays roles in privilege delegation, peer-level certification, help-desk assistance, and reputation networks. As a direct means of logical authentication, though, the reliance of human being on another has little supporting scientific literature or practice.In this paper, we explore the notion of vouching, that is, peer-level, human-intermediated authentication for access control. We explore its use in emergency authentication, when primary authenticators like passwords or hardware tokens become unavailable. We describe a practical, prototype vouching system based on SecurID, a popular hardware authentication token. We address traditional, cryptographic security requirements, but also consider questions of social engineering and user behavior. |
DOI: | 10.1145/1180405.1180427 |
URL الوصول: | https://explore.openaire.eu/search/publication?articleId=doi_________::3890816f89dc52cc8a93c82fad1c2ebc https://doi.org/10.1145/1180405.1180427 |
Rights: | CLOSED |
رقم الانضمام: | edsair.doi...........3890816f89dc52cc8a93c82fad1c2ebc |
قاعدة البيانات: | OpenAIRE |
DOI: | 10.1145/1180405.1180427 |
---|