2006
DOI: 10.17705/1cais.01704
|View full text |Cite
|
Sign up to set email alerts
|

Identification and Authentication: Technology and Implementation Issues

Abstract: Computer-based information systems in general, and Internet e-commerce and e-business systems in particular, employ many types of resources that need to be protected against access by unauthorized users. Three main components of access control are used in most information systems: identification, authentication, and authorization. In this paper we focus on authentication, which is the most problematic component. The three main approaches to user authentication are: knowledge-based, possession-based, and biomet… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
40
0
2

Year Published

2006
2006
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 32 publications
(42 citation statements)
references
References 60 publications
0
40
0
2
Order By: Relevance
“…Bento and Bento [2006] empirically tested a hacking model based on attacks and hacker behavior. Zviran and Erlich [2006] compared a variety of authentication mechanisms and discussed the problems associated with each of them. Beebe and Clark [2007] created a discriminant model for predicting hacker behavior.…”
Section: Access Controlmentioning
confidence: 99%
“…Bento and Bento [2006] empirically tested a hacking model based on attacks and hacker behavior. Zviran and Erlich [2006] compared a variety of authentication mechanisms and discussed the problems associated with each of them. Beebe and Clark [2007] created a discriminant model for predicting hacker behavior.…”
Section: Access Controlmentioning
confidence: 99%
“…This led to an evaluation that determined which of the above tasks was actually the utilization of security tools. Usage of these tools was studied in previous research [1,9,20,24] allowing comparisons to prior work, and are the necessary tools needed to protect computers from the cyber-crimes that are currently the most costly [6,10]. People often do not use the tools presented in Table 1, and leave their computers vulnerable to intruders [11].…”
Section: Conceptual Model and Research Hypothesesmentioning
confidence: 99%
“…onto individuals' computers is by taking advantage of social networking sites. (Zviran and Erlich 2006;Zviran and Haga 1999) Operation System and Programmatic Security Features (Furnell et al 2006) Privacy Protection Tools (Furnell et al 2007) Protective Technologies (Dinev and Hu 2007) Vulnerability Management (Al-Ayed et al 2005) Wireless Security Management (Woon et al 2005) For example, a Facebook.com user could share a link to a YouTube video with a number of friends, a video that may require the user to download an "update" to view it. In downloading the "update", the user is in fact downloading malware that infects the computer being used with a bot, making it part of a larger botnet (Ahamad et al 2008).…”
Section: Introductionmentioning
confidence: 99%