Subscribe Now Subscribe Today
 
FOLLOW US:     Facebook     Twitter
   
Information Technology Journal
  Year: 2011 | Volume: 10 | Issue: 6 | Page No.: 1161-1169
DOI: 10.3923/itj.2011.1161.1169
Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords
S. Safdar, M.F. Hassan, M.A. Qureshi and R. Akbar

Abstract:
The main objective of the research is to propose the effective methods of using two-dimensional nxn passwords in terms of providing secure authentication to inactive users of the system during vulnerable state. The proposition is based on the fact that if the system goes in to unsafe state due to some intrusion threat then to make the system available to the end user, it is required by the users to re-authenticate using special mechanism. These users can become active once authenticated and can continue their tasks using alternate services. These nxn passwords are long and complex, hence are difficult to memorize. But these can be very useful in certain alarming situations such as in case of system being under threat. Proposed methods provide the maximum benefits in terms of secure authentication to the system resources that is under threat. Three methods have been proposed that are classified on the way the password is created or generated. The strength and limitations of all the proposed methods has also been analyzed.

 [Fulltext PDF]   [Fulltext HTML]   [XML: Abstract + References]   [References]   [View Citation]  [Report Citation]
 RELATED ARTICLES:
  •    Implementation and Evaluation of the Live-CD Based Authentication Gateway
How to cite this article:

S. Safdar, M.F. Hassan, M.A. Qureshi and R. Akbar, 2011. Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords. Information Technology Journal, 10: 1161-1169.

DOI: 10.3923/itj.2011.1161.1169

URL: http://scialert.net/abstract/?doi=itj.2011.1161.1169

 
COMMENT ON THIS PAPER
.
 
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 
 

                 home       |       journals        |       for authors       |       for subscribers       |       asci
          © Science Alert. All Rights Reserved