MODELING THE PROCESS OF TWO-FACTOR AUTHENTICATION
نویسندگان
چکیده
The relevance of research. Authentication is the process confirming authenticity an object or subject interaction in information network by a presented identifier. Usually only one factor used. However, most security incidents occur due to use factor. easiest way create extra layer for accounts two-factor authentication using 2FA programs. In this case, additional step occurs, which increases user time and creates load on network. Thus, there need “Active Directory” directory service without component target system process, thereby making itself simpler more responsive user. purpose article develop model will allow comparison different approaches its implementation. Research progress. proposed consists three components: submodel, threat properties submodel. analysis performed showed advantages PERT method problem. simulation was carried out third-party checking second (DUO) method. final PERT-diagrams are formed. A comparative these methods terms speed out. Conclusion. developed makes it possible assess quality selected parameter with sufficient degree accuracy. particular, preferable results compared conventional methods.
منابع مشابه
factor influencing the adoption of internet banking
دوره مشترک کارشناسی ارشد بازاریابی و تجارت الکترونیک دانشگاه تربیت مدرس_ دانشگاه تکنولوژی lule? چکیده پایان نامه عوامل موثر بر پذیرش اینترنت بانک توسط مشتریان پیشرفت فناوری اطلاعات و ارتباطات و به طور خاص رشد اینترنت جهت تراکنش های معاملات بازرگانی، تاثیر بسیار عمیقی در صنعت بانکداری داشته است.این در حالی ست که نفوذ بانکداری اینترنتی در کشورهای در حال توسعه بسیار کندتر از نفوذ آن ...
15 صفحه اولa case study of the two translators of the holy quran: tahereh saffarzadeh and laleh bakhtiar
بطورکلی، کتاب های مقدسی همچون قران کریم را خوانندگان میتوان مطابق با پیش زمینه های مختلفی که درند درک کنند. محقق تلاش کرده نقش پیش زمینه اجتماعی-فرهنگی را روی ایدئولوژی های مترجمین زن و در نتیجه تاثیراتش را روی خواندن و ترجمه آیات قرآن کریم بررسی کند و ببیند که آیا تفاوت های واژگانی عمده ای میان این مترجمین وجود دارد یا نه. به این منظور، ترجمه 24 آیه از آیات قرآن کریم مورد بررسی مقایسه ای قرار ...
15 صفحه اولProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملOn the Usability of Two-Factor Authentication
Smart-card-based password authentication, known as twofactor authentication, is one of the most widely used security mechanisms to validate the legitimacy of a remote client, who must hold a valid smart card and the correct password in order to successfully login the server. So far the research on this domain has mainly focused on developing more secure, privacy-preserving and efficient protoco...
متن کاملAnalyzing two-factor authentication devices
It is expected that mobile phones will be used in various e-commerce applications, since it is handy and frequently used. Another important aspect is that mobile phones approach computers both with respect to programmability and capacity. One example of a cutting edge application is a generic authentication mechanism invented by a new Norwegian startup company: a mobile terminal is used as a pa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Su?asnì ìnformacìjnì sistemi
سال: 2022
ISSN: ['2522-9052']
DOI: https://doi.org/10.20998/2522-9052.2022.2.02