Real-World Oriented Access Control Method with a Displayed Password

نویسندگان

  • Yuji Ayatsuka
  • Michimune Kohno
  • Jun Rekimoto
چکیده

Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered users or devices, and security issues arise if visitors are permitted to use networked resources in an office and have accessibility to other resources. We propose a new access control method that uses frequently changing passwords which are displayed beside the resource. This method provides real-world-oriented access control over an internet without any need for special hardware such as sensors.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably-Secure Remote User Authentication Without Special Devices

Preface Since the commercial use of Internet started in the 1990s, Internet has been gaining popularity as a communication infrastructure with the help of its various services and contents and access methods, such as xDSL (Digital Subscriber Line), i-mode, WAP (Wireless Application Protocol), WLAN (Wireless LAN) from hot-spots and so on. The various connection methods increase the opportunity f...

متن کامل

No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web

Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. The registration process yields a login/password combination, a cookie, or something similar that can be used to access the sensitive resources. In this paper we show how an explicit registration step can be avoided on...

متن کامل

Cyber and Physical Access Control in Legacy System Using Passwords

Passwords—secret combinations of symbols—play an important role in physical world security (e.g. watchword to prevent unauthorized entry into military forbidden area) from ancient times. With emergence and advance of digital computers and computer network, passwords are also widely adopted in cyber world security protection. In most applications, password protection stands on the frontier of cy...

متن کامل

Authentication, Access Control, and Audit

—Authentication establishes the identity of one party to another. Most commonly authentication establishes the identity of a user to some part of the system, typically by means of a password. More generally, authentication can be computer-to-computer or process-toprocess and mutual in both directions. —Access control determines what one party will allow another to do with respect to resources a...

متن کامل

APLRAC: A Pattern Language for Designing and Implementing Role-Based Access Control

The Object-Oriented paradigm approaches the software development by representing real world entities into classes of software objects. Interactions between classes can be captured by patterns. A pattern language is a collection of patterns composed to solve a complex design problem. This paper presents a collection of object-oriented design patterns structured to form a pattern language for Rol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004