User authentication : a state-of-the-art review.
Coley, John A.
Haga, William J.
MetadataShow full item record
Access control of computing systems is considered a key issue among Information Systems managers. There are different methods available to computing systems to ensure a proper authentication of a user. Authentication mechanisms can use simple user-generated passwords to complicated combinations of passwords and physical characteristics of the user (i.e., voice recognition device, retina scanner, signature recognition device, etc.). This thesis looks at the various authentication mechanisms available to a security manager. It describes how different authentication mechanisms operate and the advantages and disadvantages associated with each mechanism. It also reports on several commercially available software products that support the user authentication process. Finally, a discussion of password use in the military environment and the unique requirements of the Department of Defense.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Chia, Wan Yin. (Monterey, California. Naval Postgraduate School, 2009-12);Authentication is a fundamental aspect of information security in enabling the authenticity of the source of information to be determined. Among several electronic authentication mechanisms available today, deploying the ...
Mok, Chuan-Hao. (Monterey, California. Naval Postgraduate School, 2009-12);The move toward e-government has seen many institutions put special focus on the need for security, especially that of authentication. Single-factor password-based systems have been proven inadequate in safeguarding online ...
Beedenbender, Mark G. (Monterey, California. Naval Postgraduate School, 1990-03);A widely used access control mechanism is the password. Passwords are normally composed of a meaningful detail, such as a name of a person or a sequence of numbers such as birthdate. Any person attempting to gain unauthorized ...