A Method for Ranking Authentication Products
Date: July 2008
Publication: Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008)
Page(s): 80 - 93
Source 1: https://www.cscan.org/openaccess/?id=45
Abstract or Summary:
There is a steady increase in both authentication methods and products implementing these methods. Product selection has impact on strategic factors such as system security, cost and usability. This presentation introduces a method for ranking authentication products. The method can be used for both product selection and the process of product development as supported by the case studies. Using the method, issues such as technical performance, application/system specific requirements, cost and usability are addressed.
PasswordResearch.com Note: A video related to this research that was presented at Passwords11 is available: https://www.youtube.com/watch?v=IQ4ONnEaRvw
Do you have additional information to contribute regarding this research paper? If so, please email firstname.lastname@example.org with the details.