This document proposes graph models and scoring schemes to evaluate the security and recoverability of user accounts.
It defines an account access graph to model relationships between accounts and credentials. It introduces concepts like access sets, minimal access sets, and access bases to analyze account dependencies.
The document then presents different scoring schemes to assign security and recoverability scores to accounts based on the graph model. The schemes consider factors like number of credentials needed, attributes of potential attackers, and presence of alternative recovery methods. Consistency with assigned importance levels is also evaluated.
The graph models and scoring schemes aim to help evaluate the security of user accounts and identify ways to strengthen authentication or recovery processes.