DocumentCode :
2595612
Title :
When a password is not a password [computer resource security]
Author :
Weiss, Kenneth P.
Author_Institution :
Security Dynamics Inc., Cambridge, MA, USA
fYear :
1990
fDate :
10-12 Oct 1990
Firstpage :
100
Lastpage :
108
Abstract :
This study focuses on the less obvious vulnerabilities of information systems and the philosophy and technology behind two-factor identification, authentication, and access control systems. How two-factor systems can be technically overlaid for implementation in existing environments is addressed. The theoretical issues associated with using ignition keys stored in tokens versus transmitting them in both clear text and encrypted form are discussed. Guidelines for securing computer resources are presented. Two-factor identification is discussed along with token-based ID authentication. Open networks and secure passwords, are also examined
Keywords :
access control; cryptography; security of data; authentication; computer resources; identification; information systems; secure passwords; token-based ID authentication; two-factor identification; Appropriate technology; Authentication; Computer networks; Computer security; File servers; Information resources; Information security; Information systems; Protection; Workstations;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 1990. Crime Countermeasures, Proceedings. IEEE 1990 International Carnahan Conference on
Conference_Location :
Lexington, KY
Type :
conf
DOI :
10.1109/CCST.1990.111393
Filename :
111393
Link To Document :
بازگشت