Understanding the Use of Passwords
Date: April 1988
Publication: Computers and Security, Volume 7, Issue 2
Page(s): 132 - 136
Publisher: Elsevier Science
Source 1: http://dx.doi.org/10.1016/0167-4048(88)90325-2 - Subscription or payment required
Passwords are employed widely to identify authorized -- sometimes termed registered -- users of computing systems where multiple individuals may have legitimate access to database or transaction content. Many system designers and individuals with computer security responsibilities erroneously assume that requiring password use will assure that unauthorized individuals do not gain access to -- or control of -- database content or system capabilities. That simply is not realistic.
Do you have additional information to contribute regarding this research paper? If so, please email firstname.lastname@example.org with the details.