Wer sing Sie

Wer sind Sie? is a user authentication system designed for a distributed environment. The thesis is named such because user authentication deals with the question Who are you?. In Germany, who are you? is Wer sind Sie? . In a distributed system, data security is a serious concern. Unauthorized acces...

Full description

Saved in:
Bibliographic Details
Main Authors: Co, Mary Grace, Cua, Mary Ann, Ng, Mary Grace, Yamog, Liberato K.
Format: text
Language:English
Published: Animo Repository 1996
Subjects:
Online Access:https://animorepository.dlsu.edu.ph/etd_bachelors/7063
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
Language: English
Description
Summary:Wer sind Sie? is a user authentication system designed for a distributed environment. The thesis is named such because user authentication deals with the question Who are you?. In Germany, who are you? is Wer sind Sie? . In a distributed system, data security is a serious concern. Unauthorized access to the system is one major factor of data loss. The system, therefore, should provide a security measure which ensures one simple condition: Every access by a user should be made by a valid user. Two main issues involved in the security of distributed systems, particularly in user's access, are authentication and authorization. Authentication is the process of verifying a user's identity. It answers the question Who said this? . Authorization, on the other hand, entails determining whether the user has the right to access a particular service and the access method to the resource. Authorization answers the question Who is trusted to access this? . If the user had successfully passed the authentication process, he/she will be allowed to access the services of the system, and this will be determined by the authorization process. Moreover, distributed systems run in an insecure network communications environment wherein problems, which may arise, will have to be solved. Studies have been conducted on existing user authentication algorithms. An analysis of each existing systems have given the proponents the limitations of the existing systems. With the limitations of the existing system that served as the metrics for the new algorithm, principles in making a authentication protocol and proving tools for user authentication algorithms, 'Wer sind Sie' was developed by the group.