Title :
Password-based mobile access, alternatives and experiences
Author :
Jaramillo, David ; Newhook, Richard ; Van Duy Nguyen ; Chopra, Mahendra
Author_Institution :
CIO Lab. - Mobile Innovations, IBM, Boca Raton, FL, USA
Abstract :
In current networked organizations, the rise of mobile devices has become not just a nice-to-have, but is now necessary and expected by users. It is no longer feasible for most organizations to simply reject access to mobile devices; instead, they must now look towards crafting policies and technologies to manage their presence and also protect internal resources. Commonly, most network resource actions are controlled largely via the username and password pair. This may suffice in closed, relatively limited environments. However, this paradigm is largely incompatible with mobile technologies, with issues such as user friendliness problems, bleeding of security mechanisms into personally owned equipment, and an all-or-nothing access model. In this paper we discuss the shortcomings of the user/password access model, and describe our experiences in alternative access systems with an eye to mobile device presence. We describe methods for a passwordless activation and authorization systems, application design patterns that account for mobile-specific security concerns, and a more nuanced, fine-grained trust system to ensure badly behaved mobile devices are limited in the damage they can cause.
Keywords :
authorisation; mobile computing; trusted computing; application design patterns; authorization systems; fine-grained trust system; mobile devices; mobile technologies; mobile-specific security concerns; network resource actions; networked organizations; password-based mobile access; passwordless activation; user access model; username; Authentication; Authorization; Mobile handsets; Organizations; Public key; authentication; mobile; security; usability;
Conference_Titel :
SoutheastCon 2015
Conference_Location :
Fort Lauderdale, FL
DOI :
10.1109/SECON.2015.7132912