ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
Tue, 13 May 2014 21:44:46 -0400
Larry Koved <[log in to unmask]>
text/plain; charset="UTF-8"
Larry Koved <[log in to unmask]>
text/plain (98 lines)
Workshop: Who are you?!  Adventures in Authentication

Symposium on Usable Privacy and Security (SOUPS)
Wednesday July 9, 2014
Menlo Park, CA


Our most common method of authentication continues to be based on the 
assumption of a person using a desktop computer and keyboard, or a person 
authenticating to their mobile phone.  There has been an implicit 
assumption that the effort of authenticating, both in terms of elapsed 
time, user actions, cognitive load and impact on a user's primary task, 
will be amortized over a relatively long lifetime of the authenticated 
session with the system, application or service. As computing moves into 
new environments, including mobile and embedded systems, these assumptions 
may no longer be valid.  The user’s primary task may be tending to a 
patient, driving a car, operating heavy machinery, or interacting with 
friends and colleagues via mobile apps.  Due to the nature of user 
interaction in these new computing environments, and new threat models, 
methods of authenticating are needed that are both robust, easy to use, 
and minimize impact on the user's primary task.  The time / cost of 
authentication needs to be commensurate with the level of engagement with 
these kinds of systems and applications.

The purpose of this workshop is to bring together researchers and 
practitioners to share experiences, concerns, and ideas about known and 
new authentication techniques. We are interested in discussing methods of 
evaluating the impact and usability of various authentication techniques, 
and ideas about novel authentication techniques that are secure, robust 
and usable.

Topics of interest for this workshop include:

·       Surveys and comparisons of known authentication techniques
·       Novel metrics or comparisons of metrics for authentication 
·       Empirical evaluations of authentication techniques, including 
performance, accuracy, and the impact of authentication on a user’s 
primary task
·       New authentication techniques that target emerging computing 
environments such as mobile and embedded systems
·       Approaches (including protocols) that enable weak authentication 
schemes to be more robust
·       Existing authentication techniques applied in new environments or 
usage contexts
·       Novel approaches to the design and evaluation of authentication 

The goal of this workshop is to explore these and related topics across 
the broad range of contexts, including enterprise systems, personal 
systems, and especially mobile and embedded systems (such as automotive 
and wearable systems).  This workshop provides an informal and 
interdisciplinary setting at the intersection of security, psychological, 
and behavioral science.  Panel discussions may be organized around topics 
of interest where the workshop participants will be given an opportunity 
to give presentations, which may include current or prior work in this 
area, as well as pose new challenges in authentication.

We are soliciting 1-2 page position statements that express the nature of 
your interest in the workshop; these should include the aspects of 
authentication of interest to you, including the topic(s) that you would 
like to discuss during the workshop and panel discussions.  Position 
statements must be in PDF format, preferably using the SOUPS formatting 
template (LaTeX or MS Word).  Submissions should not be blinded. 

Submissions should be made via EasyChair WAY 2014 web site:

Workshop co-chairs: 

Larry Koved                             Elizabeth Stobert
IBM T. J. Watson Research Center        Carleton University
[log in to unmask]                        [log in to unmask]

Program chair:

Elizabeth Stobert
Carleton University
[log in to unmask]

Please send workshop inquiries to: [log in to unmask] 

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see