OUTLINE 1 – Authentication Introducing

نویسنده

  • Patrick McDaniel
چکیده

Authentication is the process by which the identity of an entity is validated. Authenticating entities present credentials, such as passwords or certificates, as evidence of their identity. The entity is deemed authentic where presented credentials are valid and sufficient. Note that authentication does not determine which entities should be given access, but only verifies that an entity is who they claim to be. However, it is only after an entity is authenticated that their rights to resources can be assessed (through authorization). Hence, failure to correctly authenticate users on the Internet can leave online resources vulnerable to misuse. This article considers the semantics, methods, and mechanisms for authentication on the Internet. The goals and principles of authentication are illustrated through several expository systems. The embodied trust, operation, and limitations of these systems are explored. This article is concluded with a number of axioms for the selection and use of authentication systems on the Internet.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biometric authentication - security and usability

We would like to outline our opinions about the usability of biometric authentication systems. We outline the position of biometrics in the current field of computer security in the first section of our paper. The second chapter introduces a more systematic view of the process of biometric authentication – a layer model (of the biometric authentication process). The third section discusses the ...

متن کامل

Fast distributed bi-directional authentication for wireless sensor networks

In this paper, we present the comparison between a distributed and a centralized authentication protocol for wireless sensor networks (WSN). We outline the difference between authentication and key-agreement schemes and we propose a novel approach based on the use of polynomial functions to produce a distributed bi-directional authentication. The advantages of this approach are: speed of operat...

متن کامل

Issues in User Authentication 1

CHI 2007 Workshop: Security user studies: methodologies and best practices, April 2007. ABSTRACT In this brief paper we outline our recent work on usability studies of user authentication systems. In particular, we have conducted studies on password managers and graphical password systems, using in-lab experiments, interviews, and broader field studies. We then discuss some of the important iss...

متن کامل

Improving the Efficiency of RFID Authentication with Pre-Computation

Security of RFID authentication protocols has received considerable interest recently. However, an important aspect of such protocols that has not received as much attention is the efficiency of their communication. In this paper we investigate the efficiency benefits of pre-computation for time-constrained applications in small to medium RFID networks. We also outline a protocol utilizing this...

متن کامل

Enhancing security and privacy in biometrics-based authentication systems

Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications su...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006