Wer sing Sie
Wer sind Sie? is a user authentication system designed for a distributed environment. The thesis is named such because user authentication deals with the question Who are you?. In Germany, who are you? is Wer sind Sie? . In a distributed system, data security is a serious concern. Unauthorized acces...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
1996
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/etd_bachelors/7063 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
id |
oai:animorepository.dlsu.edu.ph:etd_bachelors-7707 |
---|---|
record_format |
eprints |
spelling |
oai:animorepository.dlsu.edu.ph:etd_bachelors-77072021-07-22T08:18:36Z Wer sing Sie Co, Mary Grace Cua, Mary Ann Ng, Mary Grace Yamog, Liberato K. Wer sind Sie? is a user authentication system designed for a distributed environment. The thesis is named such because user authentication deals with the question Who are you?. In Germany, who are you? is Wer sind Sie? . In a distributed system, data security is a serious concern. Unauthorized access to the system is one major factor of data loss. The system, therefore, should provide a security measure which ensures one simple condition: Every access by a user should be made by a valid user. Two main issues involved in the security of distributed systems, particularly in user's access, are authentication and authorization. Authentication is the process of verifying a user's identity. It answers the question Who said this? . Authorization, on the other hand, entails determining whether the user has the right to access a particular service and the access method to the resource. Authorization answers the question Who is trusted to access this? . If the user had successfully passed the authentication process, he/she will be allowed to access the services of the system, and this will be determined by the authorization process. Moreover, distributed systems run in an insecure network communications environment wherein problems, which may arise, will have to be solved. Studies have been conducted on existing user authentication algorithms. An analysis of each existing systems have given the proponents the limitations of the existing systems. With the limitations of the existing system that served as the metrics for the new algorithm, principles in making a authentication protocol and proving tools for user authentication algorithms, 'Wer sind Sie' was developed by the group. 1996-01-01T08:00:00Z text https://animorepository.dlsu.edu.ph/etd_bachelors/7063 Bachelor's Theses English Animo Repository Computers--Access control--Keystroke timing authentication Communication--Network analysis Computer network protocols Electronic data processing departments--Security measures |
institution |
De La Salle University |
building |
De La Salle University Library |
continent |
Asia |
country |
Philippines Philippines |
content_provider |
De La Salle University Library |
collection |
DLSU Institutional Repository |
language |
English |
topic |
Computers--Access control--Keystroke timing authentication Communication--Network analysis Computer network protocols Electronic data processing departments--Security measures |
spellingShingle |
Computers--Access control--Keystroke timing authentication Communication--Network analysis Computer network protocols Electronic data processing departments--Security measures Co, Mary Grace Cua, Mary Ann Ng, Mary Grace Yamog, Liberato K. Wer sing Sie |
description |
Wer sind Sie? is a user authentication system designed for a distributed environment. The thesis is named such because user authentication deals with the question Who are you?. In Germany, who are you? is Wer sind Sie? . In a distributed system, data security is a serious concern. Unauthorized access to the system is one major factor of data loss. The system, therefore, should provide a security measure which ensures one simple condition: Every access by a user should be made by a valid user. Two main issues involved in the security of distributed systems, particularly in user's access, are authentication and authorization. Authentication is the process of verifying a user's identity. It answers the question Who said this? . Authorization, on the other hand, entails determining whether the user has the right to access a particular service and the access method to the resource. Authorization answers the question Who is trusted to access this? . If the user had successfully passed the authentication process, he/she will be allowed to access the services of the system, and this will be determined by the authorization process. Moreover, distributed systems run in an insecure network communications environment wherein problems, which may arise, will have to be solved. Studies have been conducted on existing user authentication algorithms. An analysis of each existing systems have given the proponents the limitations of the existing systems. With the limitations of the existing system that served as the metrics for the new algorithm, principles in making a authentication protocol and proving tools for user authentication algorithms, 'Wer sind Sie' was developed by the group. |
format |
text |
author |
Co, Mary Grace Cua, Mary Ann Ng, Mary Grace Yamog, Liberato K. |
author_facet |
Co, Mary Grace Cua, Mary Ann Ng, Mary Grace Yamog, Liberato K. |
author_sort |
Co, Mary Grace |
title |
Wer sing Sie |
title_short |
Wer sing Sie |
title_full |
Wer sing Sie |
title_fullStr |
Wer sing Sie |
title_full_unstemmed |
Wer sing Sie |
title_sort |
wer sing sie |
publisher |
Animo Repository |
publishDate |
1996 |
url |
https://animorepository.dlsu.edu.ph/etd_bachelors/7063 |
_version_ |
1712576680330002432 |