Categories


A three-pronged solution for identifying users

Raiting 0.00

Description

The first responsibility in implementing system security is establishing the identity of the user accessing the server at the other end of the communication link. This article discusses the three layered approach in identifying the user based on three simple questions like What do you know?, What do you have? and What are your characteristics?. This also highlights the strengths and weaknesses of using this system. Examples for some of them are also supported.

Information
Title: A three-pronged solution for identifying users
Author: admin0080
Price / Cost:
Last Updated: 2003-03-03
URL: Click to Visit
Web site Language: English
Total Votes: 1
Current Rating: 0.00
Total Hits #: 1076
Listings ID #: 10002