Browsing by Subject "handheld devices"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Picture Password: A Visual Login Technique for Mobile Devices(2003-07-01) Jansen, Wayne; Gavrila, Serban I.; Korolev, Vladimir; Ayers, Richard P.; Swanstrom, RyanAdequate user authentication is a persistent problem, particularly with handheld devices, which tend to be highly personal and at the fringes of an organization's influence. Yet, these devices are being used increasingly in corporate settings where they pose a security risk, not only by containing sensitive information, but also by providing the means to access such information over wireless network interfaces. User authentication is the first line of defense against a lost or stolen PDA. However, motivating users to enable simple PIN or password mechanisms and periodically update their authentication information is a constant struggle. This paper describes a means to authenticate a user to a PDA using a visual login technique called Picture Password. The underlying rationale is that a method for login based on visual image selection is an easy and natural way for users to authenticate, removing the most serious barriers to users' compliance with corporate policy. While the technique was designed specifically for handheld devices, it is also suitable for notebooks, workstations, and other computational devices.Item Policy Expression and Enforcement for Handheld Devices(2003-05-30) Jansen, Wayne; Karygiannis, Tom; Korolev, Vlad; Gavrila, Serban; Iorga, MichaelaThe use of mobile handheld devices, such as Personal Digital Assistants (PDAs) and tablet computers, within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but instead have become indispensable tools that offer competitive business advantages for the mobile workforce. While providing productivity benefits, the ability of these devices to store and transmit corporate information through both wired and wireless networks poses potential risks to an organizations security. This paper describes a framework for managing user privileges on handheld devices. The approach is aimed at assisting enterprise security officers in administering and enforcing group and individual security policies for PDAs, and helping constrain users to comply automatically with their organizations security policy. Details of a proof-of-concept implementation of the framework are also provided.Item Security Policy Management for Handheld Devices(2003-06-30) Jensen, Wayne; Karygiannis, Tom; Iorga, Michaela; Gavrila, Serban; Korolev, VladimirThe adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new risks to existing enterprise computing resources. Therefore, organizations require new strategies to mitigate the security risks associated with the integration of wireless technologies into existing computing environments. In this paper, we describe a framework for managing user privileges on handheld devices. Our framework aims at assisting enterprise security officers in creating, distributing, and enforcing group and individual security policies for Personal Digital Assistants, and helping users to automatically comply with their organization’s security policy. Details of a proof-of-concept implementation of the framework are also provided