Password security: a case history. Morris, R. & Thompson, K. Communications of the ACM (CACM), 22(11):594-597, ACM, 11, 1979.
Website abstract bibtex This paper describes the history of the design of the password security scheme on a remotely accessed time-sharing system. The present design was the result of countering observed attempts to penetrate the system. The result is a compromise between extreme security and ease of use.
@article{
title = {Password security: a case history},
type = {article},
year = {1979},
identifiers = {[object Object]},
keywords = {password,security},
pages = {594-597},
volume = {22},
websites = {http://dx.doi.org/10.1145/359168.359172},
month = {11},
publisher = {ACM},
city = {New York, NY, USA},
id = {3a3577b1-9a61-3d64-ba7c-2acec09f5a97},
created = {2018-07-12T21:31:22.395Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:31:22.395Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {morris:password79},
source_type = {article},
private_publication = {false},
abstract = {This paper describes the history of the design of the password security scheme on a remotely accessed time-sharing system. The present design was the result of countering observed attempts to penetrate the system. The result is a compromise between extreme security and ease of use.},
bibtype = {article},
author = {Morris, Robert and Thompson, Ken},
journal = {Communications of the ACM (CACM)},
number = {11}
}
Downloads: 0
{"_id":"Kb7vKg9Atq9vMXvMC","bibbaseid":"morris-thompson-passwordsecurityacasehistory-1979","downloads":0,"creationDate":"2019-02-15T15:14:58.893Z","title":"Password security: a case history","author_short":["Morris, R.","Thompson, K."],"year":1979,"bibtype":"article","biburl":null,"bibdata":{"title":"Password security: a case history","type":"article","year":"1979","identifiers":"[object Object]","keywords":"password,security","pages":"594-597","volume":"22","websites":"http://dx.doi.org/10.1145/359168.359172","month":"11","publisher":"ACM","city":"New York, NY, USA","id":"3a3577b1-9a61-3d64-ba7c-2acec09f5a97","created":"2018-07-12T21:31:22.395Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:31:22.395Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"morris:password79","source_type":"article","private_publication":false,"abstract":"This paper describes the history of the design of the password security scheme on a remotely accessed time-sharing system. The present design was the result of countering observed attempts to penetrate the system. The result is a compromise between extreme security and ease of use.","bibtype":"article","author":"Morris, Robert and Thompson, Ken","journal":"Communications of the ACM (CACM)","number":"11","bibtex":"@article{\n title = {Password security: a case history},\n type = {article},\n year = {1979},\n identifiers = {[object Object]},\n keywords = {password,security},\n pages = {594-597},\n volume = {22},\n websites = {http://dx.doi.org/10.1145/359168.359172},\n month = {11},\n publisher = {ACM},\n city = {New York, NY, USA},\n id = {3a3577b1-9a61-3d64-ba7c-2acec09f5a97},\n created = {2018-07-12T21:31:22.395Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:31:22.395Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {morris:password79},\n source_type = {article},\n private_publication = {false},\n abstract = {This paper describes the history of the design of the password security scheme on a remotely accessed time-sharing system. The present design was the result of countering observed attempts to penetrate the system. The result is a compromise between extreme security and ease of use.},\n bibtype = {article},\n author = {Morris, Robert and Thompson, Ken},\n journal = {Communications of the ACM (CACM)},\n number = {11}\n}","author_short":["Morris, R.","Thompson, K."],"urls":{"Website":"http://dx.doi.org/10.1145/359168.359172"},"bibbaseid":"morris-thompson-passwordsecurityacasehistory-1979","role":"author","keyword":["password","security"],"downloads":0},"search_terms":["password","security","case","history","morris","thompson"],"keywords":["password","security"],"authorIDs":[]}