Wer sing Sie

Wer sind Sie? is a user authentication system designed for a distributed environment. The thesis is named such because user authentication deals with the question Who are you?. In Germany, who are you? is Wer sind Sie? . In a distributed system, data security is a serious concern. Unauthorized acces...

Full description

Saved in:
Bibliographic Details
Main Authors: Co, Mary Grace, Cua, Mary Ann, Ng, Mary Grace, Yamog, Liberato K.
Format: text
Language:English
Published: Animo Repository 1996
Subjects:
Online Access:https://animorepository.dlsu.edu.ph/etd_bachelors/7063
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
Language: English
id oai:animorepository.dlsu.edu.ph:etd_bachelors-7707
record_format eprints
spelling oai:animorepository.dlsu.edu.ph:etd_bachelors-77072021-07-22T08:18:36Z Wer sing Sie Co, Mary Grace Cua, Mary Ann Ng, Mary Grace Yamog, Liberato K. Wer sind Sie? is a user authentication system designed for a distributed environment. The thesis is named such because user authentication deals with the question Who are you?. In Germany, who are you? is Wer sind Sie? . In a distributed system, data security is a serious concern. Unauthorized access to the system is one major factor of data loss. The system, therefore, should provide a security measure which ensures one simple condition: Every access by a user should be made by a valid user. Two main issues involved in the security of distributed systems, particularly in user's access, are authentication and authorization. Authentication is the process of verifying a user's identity. It answers the question Who said this? . Authorization, on the other hand, entails determining whether the user has the right to access a particular service and the access method to the resource. Authorization answers the question Who is trusted to access this? . If the user had successfully passed the authentication process, he/she will be allowed to access the services of the system, and this will be determined by the authorization process. Moreover, distributed systems run in an insecure network communications environment wherein problems, which may arise, will have to be solved. Studies have been conducted on existing user authentication algorithms. An analysis of each existing systems have given the proponents the limitations of the existing systems. With the limitations of the existing system that served as the metrics for the new algorithm, principles in making a authentication protocol and proving tools for user authentication algorithms, 'Wer sind Sie' was developed by the group. 1996-01-01T08:00:00Z text https://animorepository.dlsu.edu.ph/etd_bachelors/7063 Bachelor's Theses English Animo Repository Computers--Access control--Keystroke timing authentication Communication--Network analysis Computer network protocols Electronic data processing departments--Security measures
institution De La Salle University
building De La Salle University Library
continent Asia
country Philippines
Philippines
content_provider De La Salle University Library
collection DLSU Institutional Repository
language English
topic Computers--Access control--Keystroke timing authentication
Communication--Network analysis
Computer network protocols
Electronic data processing departments--Security measures
spellingShingle Computers--Access control--Keystroke timing authentication
Communication--Network analysis
Computer network protocols
Electronic data processing departments--Security measures
Co, Mary Grace
Cua, Mary Ann
Ng, Mary Grace
Yamog, Liberato K.
Wer sing Sie
description Wer sind Sie? is a user authentication system designed for a distributed environment. The thesis is named such because user authentication deals with the question Who are you?. In Germany, who are you? is Wer sind Sie? . In a distributed system, data security is a serious concern. Unauthorized access to the system is one major factor of data loss. The system, therefore, should provide a security measure which ensures one simple condition: Every access by a user should be made by a valid user. Two main issues involved in the security of distributed systems, particularly in user's access, are authentication and authorization. Authentication is the process of verifying a user's identity. It answers the question Who said this? . Authorization, on the other hand, entails determining whether the user has the right to access a particular service and the access method to the resource. Authorization answers the question Who is trusted to access this? . If the user had successfully passed the authentication process, he/she will be allowed to access the services of the system, and this will be determined by the authorization process. Moreover, distributed systems run in an insecure network communications environment wherein problems, which may arise, will have to be solved. Studies have been conducted on existing user authentication algorithms. An analysis of each existing systems have given the proponents the limitations of the existing systems. With the limitations of the existing system that served as the metrics for the new algorithm, principles in making a authentication protocol and proving tools for user authentication algorithms, 'Wer sind Sie' was developed by the group.
format text
author Co, Mary Grace
Cua, Mary Ann
Ng, Mary Grace
Yamog, Liberato K.
author_facet Co, Mary Grace
Cua, Mary Ann
Ng, Mary Grace
Yamog, Liberato K.
author_sort Co, Mary Grace
title Wer sing Sie
title_short Wer sing Sie
title_full Wer sing Sie
title_fullStr Wer sing Sie
title_full_unstemmed Wer sing Sie
title_sort wer sing sie
publisher Animo Repository
publishDate 1996
url https://animorepository.dlsu.edu.ph/etd_bachelors/7063
_version_ 1712576680330002432