Verifying the authentication of an information system user

Niv Ahituv*, Yeheskel Lapid, Seev Neumann

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

11 Scopus citations

Abstract

This paper evaluates a number of methods for authentication and passwording. It first discusses the role of authentication as a component in an overall approach to information system security. It then classifies the various approaches to authentication into two categories: natural properties and artificial measures. Among the artificial measures, password is most common. The paper provides a quantitative measure for password robustness and 'lasting' power. It discusses encryption possibilities and provides a comparative evaluation of various password methods. The paper concludes by providing some guidelines for evaluating authentication methods.

Original languageEnglish
Pages (from-to)152-157
Number of pages6
JournalComputers and Security
Volume6
Issue number2
DOIs
StatePublished - Apr 1987

Keywords

  • Authentication
  • Data security
  • Information system security
  • Password
  • Password encryption

Fingerprint

Dive into the research topics of 'Verifying the authentication of an information system user'. Together they form a unique fingerprint.

Cite this