Wer sing Sie

Date of Publication

1996

Document Type

Bachelor's Thesis

Degree Name

Bachelor of Science in Computer Science

College

College of Computer Studies

Department/Unit

Computer Science

Abstract/Summary

Wer sind Sie? is a user authentication system designed for a distributed environment. The thesis is named such because user authentication deals with the question Who are you?. In Germany, who are you? is Wer sind Sie? . In a distributed system, data security is a serious concern. Unauthorized access to the system is one major factor of data loss. The system, therefore, should provide a security measure which ensures one simple condition: Every access by a user should be made by a valid user. Two main issues involved in the security of distributed systems, particularly in user's access, are authentication and authorization. Authentication is the process of verifying a user's identity. It answers the question Who said this? . Authorization, on the other hand, entails determining whether the user has the right to access a particular service and the access method to the resource. Authorization answers the question Who is trusted to access this? . If the user had successfully passed the authentication process, he/she will be allowed to access the services of the system, and this will be determined by the authorization process. Moreover, distributed systems run in an insecure network communications environment wherein problems, which may arise, will have to be solved. Studies have been conducted on existing user authentication algorithms. An analysis of each existing systems have given the proponents the limitations of the existing systems. With the limitations of the existing system that served as the metrics for the new algorithm, principles in making a authentication protocol and proving tools for user authentication algorithms, 'Wer sind Sie' was developed by the group.

Abstract Format

html

Language

English

Format

Print

Accession Number

TU08562

Shelf Location

Archives, The Learning Commons, 12F, Henry Sy Sr. Hall

Physical Description

1 v. (various pagings) ; Computer print-out.

Keywords

Computers--Access control--Keystroke timing authentication; Communication--Network analysis; Computer network protocols; Electronic data processing departments--Security measures

This document is currently not available here.

Share

COinS