• DocumentCode
    1572290
  • Title

    Finite-State Modeling and Testing of Image Based Authentication System

  • Author

    Nitin ; Singh Chauhan, D. ; Sehgal, Vivek Kumar ; Mahanot, A. ; Singh, Prashant ; Sohit Ahuja ; Shrivastava, U. ; Rana, M.M. ; Vineet Punjabi ; Vinay, S. ; Nakul Sharma

  • Author_Institution
    Dept. of CSE & IT, Jaypee Univ. of Inf. Technol., Solan
  • fYear
    2008
  • Firstpage
    427
  • Lastpage
    432
  • Abstract
    Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. This is where image based authentication (IBA) comes into play. IBA enhances the security level in an exceptionally user friendly way. This paper is a comprehensive study and comparison of proposed Jaypee University of Information Technology-IBA System with the University of Florida-IBA System on the subject of using images as the password set. Furthermore the paper introduces a holistic view of completed finite state automation (CFSA) modeling that can be carried out as a complementary step to system modeling, enabling a precise scalability of the test process, revealing much rationalization potential. Finite-state based notions enable to introduce efficient algorithms to generate Legal Interaction Pairs (IPs), Faulty Interaction Pairs, and Regular Expression (RegEx).
  • Keywords
    authorisation; finite state machines; message authentication; user interfaces; CFSA modeling; JUIT-IBA System; Jaypee University of Information Technology; UFL-IBA System; University of Florida; access control mechanisms; completed finite state automation; finite-state modeling; image based authentication system; unauthorized access; user interface; Access control; Authentication; Automatic testing; Automation; Counting circuits; Information security; Modeling; Protection; Scalability; System testing; Completed finite state automata; Faulty interaction pairs; Image based authentication system; Legal interaction pairs; Regular expression;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer and Information Science, 2008. ICIS 08. Seventh IEEE/ACIS International Conference on
  • Conference_Location
    Portland, OR
  • Print_ISBN
    978-0-7695-3131-1
  • Type

    conf

  • DOI
    10.1109/ICIS.2008.88
  • Filename
    4529857