User authentication : a state-of-the-art review.

Loading...
Thumbnail Image
Authors
Coley, John A.
Subjects
Access Control
User Authentication
Passwords
Information System Security
Advisors
Zviran, Moshe
Date of Issue
1991-03
Date
Publisher
Monterey, California. Naval Postgraduate School
Language
en_US
Abstract
Access control of computing systems is considered a key issue among Information Systems managers. There are different methods available to computing systems to ensure a proper authentication of a user. Authentication mechanisms can use simple user-generated passwords to complicated combinations of passwords and physical characteristics of the user (i.e., voice recognition device, retina scanner, signature recognition device, etc.). This thesis looks at the various authentication mechanisms available to a security manager. It describes how different authentication mechanisms operate and the advantages and disadvantages associated with each mechanism. It also reports on several commercially available software products that support the user authentication process. Finally, a discussion of password use in the military environment and the unique requirements of the Department of Defense.
Type
Thesis
Description
Series/Report No
Department
Information Systems
Organization
Naval Postgraduate School
Identifiers
NPS Report Number
Sponsors
Funder
Format
117 p.;28 cm.
Citation
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
Collections