Wer sing Sie
Date of Publication
1996
Document Type
Bachelor's Thesis
Degree Name
Bachelor of Science in Computer Science
College
College of Computer Studies
Department/Unit
Computer Science
Abstract/Summary
Wer sind Sie? is a user authentication system designed for a distributed environment. The thesis is named such because user authentication deals with the question Who are you?. In Germany, who are you? is Wer sind Sie? . In a distributed system, data security is a serious concern. Unauthorized access to the system is one major factor of data loss. The system, therefore, should provide a security measure which ensures one simple condition: Every access by a user should be made by a valid user. Two main issues involved in the security of distributed systems, particularly in user's access, are authentication and authorization. Authentication is the process of verifying a user's identity. It answers the question Who said this? . Authorization, on the other hand, entails determining whether the user has the right to access a particular service and the access method to the resource. Authorization answers the question Who is trusted to access this? . If the user had successfully passed the authentication process, he/she will be allowed to access the services of the system, and this will be determined by the authorization process. Moreover, distributed systems run in an insecure network communications environment wherein problems, which may arise, will have to be solved. Studies have been conducted on existing user authentication algorithms. An analysis of each existing systems have given the proponents the limitations of the existing systems. With the limitations of the existing system that served as the metrics for the new algorithm, principles in making a authentication protocol and proving tools for user authentication algorithms, 'Wer sind Sie' was developed by the group.
Abstract Format
html
Language
English
Format
Accession Number
TU08562
Shelf Location
Archives, The Learning Commons, 12F, Henry Sy Sr. Hall
Physical Description
1 v. (various pagings) ; Computer print-out.
Keywords
Computers--Access control--Keystroke timing authentication; Communication--Network analysis; Computer network protocols; Electronic data processing departments--Security measures
Recommended Citation
Co, M., Cua, M., Ng, M., & Yamog, L. K. (1996). Wer sing Sie. Retrieved from https://animorepository.dlsu.edu.ph/etd_bachelors/7063