RE: Question regarding authentication work

To Dave and Jason

Thank you both - sounds like more guidance on this is on the way. Look forward to chatting with you both at our next meeting. 

Scott. 

Dr Scott Hollier 
Digital Access Specialist 
Mobile: +61 (0)430 351 909
Web: www.hollier.info 

Technology for everyone

Keep up-to-date with digital access news – follow @scotthollier on Twitter or e-mail newsletter@hollier.info with ‘subscribe’ in the subject line.

-----Original Message-----
From: White, Jason J [mailto:jjwhite@ets.org] 
Sent: Friday, 12 May 2017 8:53 PM
To: David Sloan <dsloan@paciellogroup.com>; RQTF <public-rqtf@w3.org>
Subject: RE: Question regarding authentication work 

Having an overview of the most important authentication mechanisms presently under discussion would indeed be useful in defining (and thus confining) our authentication investigation.

As an aside, the gesture recognition authentication technique described at the CHI 2017 conference - See "Where Usability and Security Go Hand-in-Hand: Robust Gesture-Based Authentication for Mobile Systems" - raises accessibility concerns for people whose ability to trace a pattern reliably on a touch device is limited.

Proceedings (cited by Dave) are at
https://chi2017.acm.org/proceedings.html


> -----Original Message-----
> From: David Sloan [mailto:dsloan@paciellogroup.com]
> Sent: Friday, May 12, 2017 4:34 AM
> To: RQTF <public-rqtf@w3.org>
> Subject: Re: Question regarding authentication work
>
> Hi Scott
>
> We didn’t discuss this in any real detail at the last call. That said, 
> the authentication resources we added from the CHI 2017 publication 
> list will help identify emerging areas that are on the radar of the 
> human-computer interaction community.
>
> But during the call, we did make plans to arrange a call with Wendy 
> Seltzer (W3C Strategy Lead and Policy Counsel) to discuss our current 
> work on CAPTCHA and authentication. Maybe one of the outcomes of that 
> could be an indication of key mechanisms we need to address, and a 
> strategy for a more focused literature review?
>
> Dave
>
> > On 12 May 2017, at 03:49, Scott Hollier <scott@hollier.info> wrote:
> >
> > To the RQTF
> >
> > I’ve just read through the minutes of the last meeting, and wanted 
> > to ask a
> quick question – in regards to the authentication work, we discussed a 
> few weeks ago about the possibility of seeking a list of the key 
> authentication mechanisms currently in discussion in other working 
> groups to help us in doIng some more in-depth research on the 
> associated accessibility implications.  In the minutes it looks like 
> this was touched on but I just wanted to see if any progress has been 
> made on that point. I ask because once a list of a few rapidly 
> advancing authentication methods is established, I’m in a position to 
> pull together specific literature on those areas for investigation and provide a review, similar to my CAPTCHA contribution.
> >
> > Thank you
> >
> > Scott.
> >
> >
> > <image001.gif>Dr Scott Hollier
> > Digital Access Specialist
> > Mobile: +61 (0)430 351 909
> > Web: www.hollier.info
> >
> > Technology for everyone
> >
> > Keep up-to-date with digital access news – follow @scotthollier on 
> > Twitter or
> e-mail newsletter@hollier.info with ‘subscribe’ in the subject line.
>
> David Sloan
>
> UX Research Lead
> The Paciello Group
> dsloan@paciellogroup.com
>
> CONFIDENTIALITY NOTICE: The information contained in this message may 
> be privileged, confidential and protected from disclosure. If you are 
> not the intended recipient, any use, disclosure, dissemination, 
> distribution or copying of any portion of this message or any 
> attachment is strictly prohibited. If you think you have received this 
> message in error, please notify the sender at the above e- mail address, and delete this e-mail along with any attachments. Thank you.
>


________________________________

This e-mail and any files transmitted with it may contain privileged or confidential information. It is solely for use by the individual for whom it is intended, even if addressed incorrectly. If you received this e-mail in error, please notify the sender; do not disclose, copy, distribute, or take any action in reliance on the contents of this information; and delete it from your system. Any other use of this e-mail is prohibited.


Thank you for your compliance.

________________________________

Received on Saturday, 13 May 2017 09:24:29 UTC