TY - GEN
T1 - KeyPocket - Improving security and usability for provider independent login architectures with mobile devices
AU - Ebert, André
AU - Marouane, Chadly
AU - Rott, Benno
AU - Werner, Martin
N1 - Publisher Copyright:
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015.
PY - 2015
Y1 - 2015
N2 - Nowadays, many daily duties being of a private as well as of a business nature are handled with the help of online services. Due to migrating formerly local desktop applications into clouds (e.g., Microsoft Office Online, etc.), services become available by logging in into a user account through a web browser. But possibilities for authenticating a user in a web browser are limited and employing a username with a password is still de facto standard, disregarding open security or usability issues. Notwithstanding new developments on that subject, there is no sufficient alternative available. In this paper, we specify the requirements for a secure, easy-to-use, and third-party-independent authentication architecture. Moreover, we present KeyPocket, a user-centric approach aligned to these requirements with the help of the user’s smartphone. Subsequently, we present its state of implementation and discuss its individual capabilities and features.
AB - Nowadays, many daily duties being of a private as well as of a business nature are handled with the help of online services. Due to migrating formerly local desktop applications into clouds (e.g., Microsoft Office Online, etc.), services become available by logging in into a user account through a web browser. But possibilities for authenticating a user in a web browser are limited and employing a username with a password is still de facto standard, disregarding open security or usability issues. Notwithstanding new developments on that subject, there is no sufficient alternative available. In this paper, we specify the requirements for a secure, easy-to-use, and third-party-independent authentication architecture. Moreover, we present KeyPocket, a user-centric approach aligned to these requirements with the help of the user’s smartphone. Subsequently, we present its state of implementation and discuss its individual capabilities and features.
KW - Mobile-based login architectures
KW - Multi-factor authentication
KW - Security
KW - Usability
UR - http://www.scopus.com/inward/record.url?scp=84958062332&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-28865-9_3
DO - 10.1007/978-3-319-28865-9_3
M3 - Conference contribution
AN - SCOPUS:84958062332
SN - 9783319288642
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 41
EP - 57
BT - Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Revised Selected Papers
A2 - Thuraisingham, Bhavani
A2 - Wang, XiaoFeng
A2 - Yegneswaran, Vinod
PB - Springer Verlag
T2 - 11th International Conference Security and Privacy in Communication Networks, SecureComm 2015
Y2 - 26 October 2015 through 29 October 2015
ER -