Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords

The main objective of the research is to propose the effective methods of using two-dimensional nxn passwords in terms of providing secure authentication to inactive users of the system during vulnerable state. The proposition is based on the fact that if the system goes in to unsafe state due to so...

Full description

Saved in:
Bibliographic Details
Main Authors: Safdar, S., Hassan, M.F., Qureshi, M.A., Akhbar, R.
Format: Citation Index Journal
Published: Asian Network for Scientific Information (ANSI) 2011
Subjects:
Online Access:http://eprints.utp.edu.my/5813/1/qredirect.php%3Fdoi%3Ditj.2011.1161.1169%26linkid%3Dpdf
http://scialert.net/abstract/?doi=itj.2011.1161.1169
http://eprints.utp.edu.my/5813/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utp.eprints.5813
record_format eprints
spelling my.utp.eprints.58132017-01-19T08:23:25Z Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords Safdar, S. Hassan, M.F. Qureshi, M.A. Akhbar, R. QA75 Electronic computers. Computer science QA76 Computer software The main objective of the research is to propose the effective methods of using two-dimensional nxn passwords in terms of providing secure authentication to inactive users of the system during vulnerable state. The proposition is based on the fact that if the system goes in to unsafe state due to some intrusion threat then to make the system available to the end user, it is required by the users to re-authenticate using special mechanism. These users can become active once authenticated and can continue their tasks using alternate services. These nxn passwords are long and complex, hence are difficult to memorize. But these can be very useful in certain alarming situations such as in case of system being under threat. Proposed methods provide the maximum benefits in terms of secure authentication to the system resources that is under threat. Three methods have been proposed that are classified on the way the password is created or generated. The strength and limitations of all the proposed methods has also been analyzed. Asian Network for Scientific Information (ANSI) 2011 Citation Index Journal PeerReviewed application/pdf http://eprints.utp.edu.my/5813/1/qredirect.php%3Fdoi%3Ditj.2011.1161.1169%26linkid%3Dpdf http://scialert.net/abstract/?doi=itj.2011.1161.1169 Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akhbar, R. (2011) Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords. [Citation Index Journal] http://eprints.utp.edu.my/5813/
institution Universiti Teknologi Petronas
building UTP Resource Centre
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Petronas
content_source UTP Institutional Repository
url_provider http://eprints.utp.edu.my/
topic QA75 Electronic computers. Computer science
QA76 Computer software
spellingShingle QA75 Electronic computers. Computer science
QA76 Computer software
Safdar, S.
Hassan, M.F.
Qureshi, M.A.
Akhbar, R.
Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords
description The main objective of the research is to propose the effective methods of using two-dimensional nxn passwords in terms of providing secure authentication to inactive users of the system during vulnerable state. The proposition is based on the fact that if the system goes in to unsafe state due to some intrusion threat then to make the system available to the end user, it is required by the users to re-authenticate using special mechanism. These users can become active once authenticated and can continue their tasks using alternate services. These nxn passwords are long and complex, hence are difficult to memorize. But these can be very useful in certain alarming situations such as in case of system being under threat. Proposed methods provide the maximum benefits in terms of secure authentication to the system resources that is under threat. Three methods have been proposed that are classified on the way the password is created or generated. The strength and limitations of all the proposed methods has also been analyzed.
format Citation Index Journal
author Safdar, S.
Hassan, M.F.
Qureshi, M.A.
Akhbar, R.
author_facet Safdar, S.
Hassan, M.F.
Qureshi, M.A.
Akhbar, R.
author_sort Safdar, S.
title Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords
title_short Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords
title_full Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords
title_fullStr Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords
title_full_unstemmed Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords
title_sort effective methods for secure authentication in vulnerable workflows using nxn passwords
publisher Asian Network for Scientific Information (ANSI)
publishDate 2011
url http://eprints.utp.edu.my/5813/1/qredirect.php%3Fdoi%3Ditj.2011.1161.1169%26linkid%3Dpdf
http://scialert.net/abstract/?doi=itj.2011.1161.1169
http://eprints.utp.edu.my/5813/
_version_ 1738655433563832320
score 13.18916