User authentication : a state-of-the-art review.
Loading...
Authors
Coley, John A.
Subjects
Access Control
User Authentication
Passwords
Information System Security
User Authentication
Passwords
Information System Security
Advisors
Zviran, Moshe
Date of Issue
1991-03
Date
Publisher
Monterey, California. Naval Postgraduate School
Language
en_US
Abstract
Access control of computing systems is considered a key issue among
Information Systems managers. There are different methods available to
computing systems to ensure a proper authentication of a user. Authentication
mechanisms can use simple user-generated passwords to complicated
combinations of passwords and physical characteristics of the user (i.e., voice
recognition device, retina scanner, signature recognition device, etc.).
This thesis looks at the various authentication mechanisms available to a
security manager. It describes how different authentication mechanisms
operate and the advantages and disadvantages associated with each
mechanism. It also reports on several commercially available software products
that support the user authentication process. Finally, a discussion of
password use in the military environment and the unique requirements of the
Department of Defense.
Type
Thesis
Description
Series/Report No
Department
Information Systems
Organization
Naval Postgraduate School
Identifiers
NPS Report Number
Sponsors
Funder
Format
117 p.;28 cm.
Citation
Distribution Statement
Approved for public release; distribution is unlimited.