Towards Supporting a Diverse Ecosystem of Authentication Schemes Alain Forget , Sonia Chiasson, & Robert Biddle aforget@cmu.edu Presented at the Who are you?! Adventures in Authentication Workshop Symposium on Usable Privacy and Security 2014 0
Knowledge-Based Authentication 1
2
Choose Your Own Authentication (CYOA) 3
User Experience Example: Registration 4
User Experience Example: Login 5
Two-Party CYOA Architecture 6
Three-Party CYOA Architecture 7
CYOA offers numerous advantages • Easy adoption for existing systems • Supports most KBA schemes • Facilitates administration & scheme design • Accommodates user preference & accessibility 8
Future Work • User studies and data analysis are on-going • CYOA support for non-KBA schemes • Accessible authentication • Automatically determine user abilities 9
Towards Supporting a Diverse Ecosystem of Authentication Schemes Alain Forget , Sonia Chiasson, & Robert Biddle aforget@cmu.edu Presented at the Who are you?! Adventures in Authentication Workshop Symposium on Usable Privacy and Security 2014 10
Recommend
More recommend