@inproceedings{Bishop:1991aa, Address = {Los Alamitos, CA, USA}, Author = {Bishop, Matt}, Booktitle = {Proceedings of Compcon Spring '91: A Digest of Papers}, Doi = {10.1109/CMPCON.1991.128801}, Isbn = {0-8186-2134-6}, Month = {Feb.}, Pages = {167--169}, Publisher = {IEEE Computer Society}, Title = {Password Management}, Year = {1991}, Abstract = {Problems of password selection and password management are discussed. Using a simple yet powerful model, the author describes ways to select passwords and identifies two techniques of hindering the compromise of a system by guarding the information and algorithms used to validate user passwords. It is pointed out that obtaining access to a system, or to resources on the system, is the first step in attacking the system. Penetration by obtaining, or guessing, a password is a time-honored, and extremely effective, technique for gaining such access; thus, a firm understanding of passwords, their uses, and techniques for password management are essential to the security of any computer system.}, Url = {http://dx.doi.org/10.1109/CMPCON.1991.128801}, }