Pass-thoughts: authenticating with our minds
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Dying, death, and mortality: towards thanatosensitivity in HCI
CHI '09 Extended Abstracts on Human Factors in Computing Systems
A death in the family: opportunities for designing technologies for the bereaved
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Passing on & putting to rest: understanding bereavement in the context of interactive technologies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Multi-lifespan information system design in post-conflict societies: an evolving project in Rwanda
CHI '10 Extended Abstracts on Human Factors in Computing Systems
"We will never forget you [online]": an empirical investigation of post-mortem myspace comments
Proceedings of the ACM 2011 conference on Computer supported cooperative work
Matters of life and death: locating the end of life in lifespan-oriented hci research
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
I said your name in an empty room: grieving and continuing bonds on facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Dealing with death in design: developing systems for the bereaved
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Graphical passwords: Learning from the first twelve years
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
Death is an uncomfortable subject for many people, and digital systems are rarely designed to deal with this event. In particular, the wide array of existing digital authentication infrastructure rarely deals with gracefully retiring credentials in a uniform fashion. This research paper highlights an emerging paradigm: gracefully dealing with expired digital identities in a secure, privacy-preserving fashion. It examines the confluence of modern browser technology, cloud services, and human factors involved in managing a person's digital footprint while they live and retiring it when they die. We contemplate a potential approach to dealing with credentials after death by using cloud computing. We consider the reasons that such an approach may actually provide an opportunity for enhancing authentication security by frustrating identity stealing attacks. We note that this paper is not aimed at trivializing the real grief and loss that people feel, but rather an attempt to understand how security and privacy concerns are shaped by the end of life, with the ultimate goal of easing this transition for friends and family.