Two integrated schemes of user authentication and access control in a distributed computer network

J. K. Jan, Yuh-Min Tseng

Research output: Contribution to journalArticle

10 Citations (Scopus)

Abstract

With the growth in the scale of network technologies, security has become a major concern and a limiting factor. Computer networks provide convenient procedures for users operating at remote places. However, an intruder can easily access and intercept information transmitted in an open channel. Two integrated schemes for user authentication and access control are proposed, which are mechanisms used to provide for the protection of privacy and security in a distributed environment. One scheme is a dynamic approach which provides an efficient updating process for the modification of access rights. The second scheme allows servers to simplify verification processes for multiple access requests of a user at the same time. Both schemes are noninteractive approaches in which security is based on the computational difficulty of solving the discrete logarithm problem. Compared with other schemes proposed previously, the schemes are more secure and efficient and suitable for applications in a distributed environment. Intruders cannot derive secret information from public information. Intruders are not able to acquire the passwords of users from previously intercepted messages. By applying a time stamp, the schemes can withstand the replaying attack.

Original languageEnglish
Pages (from-to)419-424
Number of pages6
JournalIEE Proceedings: Computers and Digital Techniques
Volume145
Issue number6
Publication statusPublished - 1999 Dec 1

Fingerprint

User Authentication
Distributed Networks
Computer Networks
Computer networks
Access Control
Access control
Authentication
Servers
Distributed Environment
Discrete Logarithm Problem
Open Channel
Timestamp
Password
Intercept
Multiple Access
Privacy
Updating
Simplify
Server
Limiting

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Hardware and Architecture
  • Computational Theory and Mathematics

Cite this

@article{a6bc7ac80c914859b85a752756577513,
title = "Two integrated schemes of user authentication and access control in a distributed computer network",
abstract = "With the growth in the scale of network technologies, security has become a major concern and a limiting factor. Computer networks provide convenient procedures for users operating at remote places. However, an intruder can easily access and intercept information transmitted in an open channel. Two integrated schemes for user authentication and access control are proposed, which are mechanisms used to provide for the protection of privacy and security in a distributed environment. One scheme is a dynamic approach which provides an efficient updating process for the modification of access rights. The second scheme allows servers to simplify verification processes for multiple access requests of a user at the same time. Both schemes are noninteractive approaches in which security is based on the computational difficulty of solving the discrete logarithm problem. Compared with other schemes proposed previously, the schemes are more secure and efficient and suitable for applications in a distributed environment. Intruders cannot derive secret information from public information. Intruders are not able to acquire the passwords of users from previously intercepted messages. By applying a time stamp, the schemes can withstand the replaying attack.",
author = "Jan, {J. K.} and Yuh-Min Tseng",
year = "1999",
month = "12",
day = "1",
language = "English",
volume = "145",
pages = "419--424",
journal = "IEE Proceedings: Computers and Digital Techniques",
issn = "1350-2387",
publisher = "Institute of Electrical Engineers",
number = "6",

}

Two integrated schemes of user authentication and access control in a distributed computer network. / Jan, J. K.; Tseng, Yuh-Min.

In: IEE Proceedings: Computers and Digital Techniques, Vol. 145, No. 6, 01.12.1999, p. 419-424.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Two integrated schemes of user authentication and access control in a distributed computer network

AU - Jan, J. K.

AU - Tseng, Yuh-Min

PY - 1999/12/1

Y1 - 1999/12/1

N2 - With the growth in the scale of network technologies, security has become a major concern and a limiting factor. Computer networks provide convenient procedures for users operating at remote places. However, an intruder can easily access and intercept information transmitted in an open channel. Two integrated schemes for user authentication and access control are proposed, which are mechanisms used to provide for the protection of privacy and security in a distributed environment. One scheme is a dynamic approach which provides an efficient updating process for the modification of access rights. The second scheme allows servers to simplify verification processes for multiple access requests of a user at the same time. Both schemes are noninteractive approaches in which security is based on the computational difficulty of solving the discrete logarithm problem. Compared with other schemes proposed previously, the schemes are more secure and efficient and suitable for applications in a distributed environment. Intruders cannot derive secret information from public information. Intruders are not able to acquire the passwords of users from previously intercepted messages. By applying a time stamp, the schemes can withstand the replaying attack.

AB - With the growth in the scale of network technologies, security has become a major concern and a limiting factor. Computer networks provide convenient procedures for users operating at remote places. However, an intruder can easily access and intercept information transmitted in an open channel. Two integrated schemes for user authentication and access control are proposed, which are mechanisms used to provide for the protection of privacy and security in a distributed environment. One scheme is a dynamic approach which provides an efficient updating process for the modification of access rights. The second scheme allows servers to simplify verification processes for multiple access requests of a user at the same time. Both schemes are noninteractive approaches in which security is based on the computational difficulty of solving the discrete logarithm problem. Compared with other schemes proposed previously, the schemes are more secure and efficient and suitable for applications in a distributed environment. Intruders cannot derive secret information from public information. Intruders are not able to acquire the passwords of users from previously intercepted messages. By applying a time stamp, the schemes can withstand the replaying attack.

UR - http://www.scopus.com/inward/record.url?scp=0032201754&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0032201754&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:0032201754

VL - 145

SP - 419

EP - 424

JO - IEE Proceedings: Computers and Digital Techniques

JF - IEE Proceedings: Computers and Digital Techniques

SN - 1350-2387

IS - 6

ER -