The Community for Technology Leaders
RSS Icon
May 14, 2008 to May 16, 2008
ISBN: 978-0-7695-3131-1
pp: 427-432
Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. This is where Image Based Authentication (IBA) comes into play. IBA enhances the security level in an exceptionally user friendly way. This paper is a comprehensive study and comparison of proposed Jaypee University of Information Technology–IBA System with the University of Florida–IBA System on the subject of using images as the password set. Furthermore the paper introduces a holistic view of Completed Finite State Automation (CFSA) modeling that can be carried out as a complementary step to system modeling, enabling a precise scalability of the test process, revealing much rationalization potential. Finite-state based notions enable to introduce efficient algorithms to generate Legal Interaction Pairs (IPs), Faulty Interaction Pairs, and Regular Expression (RegEx).
Image based authentication system, Completed finite state automata, Legal interaction pairs, Faulty interaction pairs, Regular expression
Nitin, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma, "Finite-State Modeling and Testing of Image Based Authentication System", ICIS, 2008, Computer and Information Science, ACIS International Conference on, Computer and Information Science, ACIS International Conference on 2008, pp. 427-432, doi:10.1109/ICIS.2008.88
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool