Identification and Authentication: Technology and Implementation Issues
نویسندگان
چکیده
منابع مشابه
Identification and Authentication: Technology and Implementation Issues
Computer-based information systems in general, and Internet e-commerce and e-business systems in particular, employ many types of resources that need to be protected against access by unauthorized users. Three main components of access control are used in most information systems: identification, authentication, and authorization. In this paper we focus on authentication, which is the most prob...
متن کاملImplementation Issues of Pki Technology
Today, one of the biggest concerns about using the Internet for business-critical data is security. This paper will concentrate on the area of software security based on public key cryptographic technology. The Public Key systems make it possible for two parties to communicate securely without either having to know or trust the other party. This is possible because a third party, called the Cer...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملFacial Recognition Technology A Survey of Policy and Implementation Issues
ACKNOWLEDGMENTS Although responsibility for the final product is ours, we could not have produced this report without key contributions from several individuals to whom we are deeply indebted. Jonathon Phillips and Alex Vasilescu generously shared their wisdom and expertise. Extended conversations with them, particularly in the early phases of the project, guided us to important sources and hel...
متن کاملVideo Authentication: Issues and Challenges
Video authentication aims to ensure the trustworthiness of the video by verifying the integrity and source of video data. It has gained much attention in the recent years. In this paper we present the issues in the designing of a video authentication system. These issues include the classification of tampering attacks, levels of tampering attack and robustness. Further we present the categoriza...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communications of the Association for Information Systems
سال: 2006
ISSN: 1529-3181
DOI: 10.17705/1cais.01704