- From: White, Jason J <jjwhite@ets.org>
- Date: Fri, 12 May 2017 12:52:59 +0000
- To: David Sloan <dsloan@paciellogroup.com>, RQTF <public-rqtf@w3.org>
Having an overview of the most important authentication mechanisms presently under discussion would indeed be useful in defining (and thus confining) our authentication investigation. As an aside, the gesture recognition authentication technique described at the CHI 2017 conference - See "Where Usability and Security Go Hand-in-Hand: Robust Gesture-Based Authentication for Mobile Systems" - raises accessibility concerns for people whose ability to trace a pattern reliably on a touch device is limited. Proceedings (cited by Dave) are at https://chi2017.acm.org/proceedings.html > -----Original Message----- > From: David Sloan [mailto:dsloan@paciellogroup.com] > Sent: Friday, May 12, 2017 4:34 AM > To: RQTF <public-rqtf@w3.org> > Subject: Re: Question regarding authentication work > > Hi Scott > > We didn’t discuss this in any real detail at the last call. That said, the > authentication resources we added from the CHI 2017 publication list will help > identify emerging areas that are on the radar of the human-computer > interaction community. > > But during the call, we did make plans to arrange a call with Wendy Seltzer (W3C > Strategy Lead and Policy Counsel) to discuss our current work on CAPTCHA and > authentication. Maybe one of the outcomes of that could be an indication of > key mechanisms we need to address, and a strategy for a more focused > literature review? > > Dave > > > On 12 May 2017, at 03:49, Scott Hollier <scott@hollier.info> wrote: > > > > To the RQTF > > > > I’ve just read through the minutes of the last meeting, and wanted to ask a > quick question – in regards to the authentication work, we discussed a few > weeks ago about the possibility of seeking a list of the key authentication > mechanisms currently in discussion in other working groups to help us in doIng > some more in-depth research on the associated accessibility implications. In the > minutes it looks like this was touched on but I just wanted to see if any progress > has been made on that point. I ask because once a list of a few rapidly > advancing authentication methods is established, I’m in a position to pull > together specific literature on those areas for investigation and provide a > review, similar to my CAPTCHA contribution. > > > > Thank you > > > > Scott. > > > > > > <image001.gif>Dr Scott Hollier > > Digital Access Specialist > > Mobile: +61 (0)430 351 909 > > Web: www.hollier.info > > > > Technology for everyone > > > > Keep up-to-date with digital access news – follow @scotthollier on Twitter or > e-mail newsletter@hollier.info with ‘subscribe’ in the subject line. > > David Sloan > > UX Research Lead > The Paciello Group > dsloan@paciellogroup.com > > CONFIDENTIALITY NOTICE: The information contained in this message may be > privileged, confidential and protected from disclosure. If you are not the > intended recipient, any use, disclosure, dissemination, distribution or copying of > any portion of this message or any attachment is strictly prohibited. If you think > you have received this message in error, please notify the sender at the above e- > mail address, and delete this e-mail along with any attachments. Thank you. > ________________________________ This e-mail and any files transmitted with it may contain privileged or confidential information. It is solely for use by the individual for whom it is intended, even if addressed incorrectly. If you received this e-mail in error, please notify the sender; do not disclose, copy, distribute, or take any action in reliance on the contents of this information; and delete it from your system. Any other use of this e-mail is prohibited. Thank you for your compliance. ________________________________
Received on Friday, 12 May 2017 12:53:34 UTC