Real-World Oriented Access Control Method with a Displayed Password
نویسندگان
چکیده
Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered users or devices, and security issues arise if visitors are permitted to use networked resources in an office and have accessibility to other resources. We propose a new access control method that uses frequently changing passwords which are displayed beside the resource. This method provides real-world-oriented access control over an internet without any need for special hardware such as sensors.
منابع مشابه
Provably-Secure Remote User Authentication Without Special Devices
Preface Since the commercial use of Internet started in the 1990s, Internet has been gaining popularity as a communication infrastructure with the help of its various services and contents and access methods, such as xDSL (Digital Subscriber Line), i-mode, WAP (Wireless Application Protocol), WLAN (Wireless LAN) from hot-spots and so on. The various connection methods increase the opportunity f...
متن کاملNo Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. The registration process yields a login/password combination, a cookie, or something similar that can be used to access the sensitive resources. In this paper we show how an explicit registration step can be avoided on...
متن کاملCyber and Physical Access Control in Legacy System Using Passwords
Passwords—secret combinations of symbols—play an important role in physical world security (e.g. watchword to prevent unauthorized entry into military forbidden area) from ancient times. With emergence and advance of digital computers and computer network, passwords are also widely adopted in cyber world security protection. In most applications, password protection stands on the frontier of cy...
متن کاملAuthentication, Access Control, and Audit
—Authentication establishes the identity of one party to another. Most commonly authentication establishes the identity of a user to some part of the system, typically by means of a password. More generally, authentication can be computer-to-computer or process-toprocess and mutual in both directions. —Access control determines what one party will allow another to do with respect to resources a...
متن کاملAPLRAC: A Pattern Language for Designing and Implementing Role-Based Access Control
The Object-Oriented paradigm approaches the software development by representing real world entities into classes of software objects. Interactions between classes can be captured by patterns. A pattern language is a collection of patterns composed to solve a complex design problem. This paper presents a collection of object-oriented design patterns structured to form a pattern language for Rol...
متن کامل