MRAS: A Multi-Layered Remote Authentication System
نویسندگان
چکیده
Accessing computer resources from off campus has been a continuing problem for both students and faculty, and this problem has been exacerbated by the growth of our graduate program. A multi-layered remote authentication system has been created for use by students and faculty providing the ability to telecommute and gain remote access to these resources. Security concerns have also been addressed regarding unauthorized access to college network resources. This approach could also be ported to most business environments as they share many of the same concerns as our college providing remote access to users while mitigating potential threats to their networked systems.
منابع مشابه
MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملA Secure Remote Authentication, Operation and Management Infrastructure for Distributed Wireless Sensor Network Testbeds
In this paper we propose an infrastructure for a secure remote authentication, management and operation system for a distributed global wireless sensor network testbed. We base the design of the architecture on an existing well-established, widely deployed and frequently used authentication and authorization system developed to simplify inter-organizational access to web-resources. The proposed...
متن کاملDynamic Multi-Factor Security
This paper identifies the current limitations of electronic remote authentication systems and presents a new remote authentication system that addresses these limitations. Examples of these limitations can be easily observed in everyday life. Some more common examples include: credit card theft, identity theft, insurance fraud and hacking of private computer networks. Our proposed solution incl...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملA new remote user authentication scheme for multi-server architecture
Remote user authentication is used to validate the legitimacy of a remote login user. Conventional user authentication schemes are suited to solve the privacy and security problems for the single client/server architecture environment. However, the use of computer networks and information technology has grown spectacularly. More and more network architectures are used in multi-server environmen...
متن کامل