Nitin, D. Chauhan, V. Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, M. Rana, V. Punjabi, S. Vinay, Nakul Sharma
{"title":"基于图像的认证系统的有限状态建模与测试","authors":"Nitin, D. Chauhan, V. Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, M. Rana, V. Punjabi, S. Vinay, Nakul Sharma","doi":"10.1109/ICIS.2008.88","DOIUrl":null,"url":null,"abstract":"Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. This is where image based authentication (IBA) comes into play. IBA enhances the security level in an exceptionally user friendly way. This paper is a comprehensive study and comparison of proposed Jaypee University of Information Technology-IBA System with the University of Florida-IBA System on the subject of using images as the password set. Furthermore the paper introduces a holistic view of completed finite state automation (CFSA) modeling that can be carried out as a complementary step to system modeling, enabling a precise scalability of the test process, revealing much rationalization potential. Finite-state based notions enable to introduce efficient algorithms to generate Legal Interaction Pairs (IPs), Faulty Interaction Pairs, and Regular Expression (RegEx).","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"251 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Finite-State Modeling and Testing of Image Based Authentication System\",\"authors\":\"Nitin, D. Chauhan, V. Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, M. Rana, V. Punjabi, S. Vinay, Nakul Sharma\",\"doi\":\"10.1109/ICIS.2008.88\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. This is where image based authentication (IBA) comes into play. IBA enhances the security level in an exceptionally user friendly way. This paper is a comprehensive study and comparison of proposed Jaypee University of Information Technology-IBA System with the University of Florida-IBA System on the subject of using images as the password set. Furthermore the paper introduces a holistic view of completed finite state automation (CFSA) modeling that can be carried out as a complementary step to system modeling, enabling a precise scalability of the test process, revealing much rationalization potential. Finite-state based notions enable to introduce efficient algorithms to generate Legal Interaction Pairs (IPs), Faulty Interaction Pairs, and Regular Expression (RegEx).\",\"PeriodicalId\":382781,\"journal\":{\"name\":\"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)\",\"volume\":\"251 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIS.2008.88\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIS.2008.88","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Finite-State Modeling and Testing of Image Based Authentication System
Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. This is where image based authentication (IBA) comes into play. IBA enhances the security level in an exceptionally user friendly way. This paper is a comprehensive study and comparison of proposed Jaypee University of Information Technology-IBA System with the University of Florida-IBA System on the subject of using images as the password set. Furthermore the paper introduces a holistic view of completed finite state automation (CFSA) modeling that can be carried out as a complementary step to system modeling, enabling a precise scalability of the test process, revealing much rationalization potential. Finite-state based notions enable to introduce efficient algorithms to generate Legal Interaction Pairs (IPs), Faulty Interaction Pairs, and Regular Expression (RegEx).