User identification, access control, and audit requirements

ACM '84 Pub Date : 1900-01-01 DOI:10.1145/800171.809639
L. Chalmers
{"title":"User identification, access control, and audit requirements","authors":"L. Chalmers","doi":"10.1145/800171.809639","DOIUrl":null,"url":null,"abstract":"Good computer security depends upon knowing who is using the system and managing how each individual is able to access the information on the system. The next generation of computer should build in the kind of controls which are often added on to today's systems. This session will discuss the objectives for positively identifying system users, controlling their use of computerized resources, and providing accountability for users who are authorized and for those who attempt to exceed their authority.\n Traditionally, user identification depends upon an identification code (ID) and a password. Password security has proven to be weak: where users are allowed to select their own passwords, they tend to select ones that are easily guessed, and where passwords are assigned, the users tend to write them down. Future user identification systems should expand into something a user has (e.g. a badge) or something a user is (e.g. fingerprints). Signature verification is a technology which is worth improving since it offers good security within existing legal and social contexts. Ideally, user identification and authentication should be based upon a combination of two or more technologies.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM '84","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/800171.809639","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Good computer security depends upon knowing who is using the system and managing how each individual is able to access the information on the system. The next generation of computer should build in the kind of controls which are often added on to today's systems. This session will discuss the objectives for positively identifying system users, controlling their use of computerized resources, and providing accountability for users who are authorized and for those who attempt to exceed their authority. Traditionally, user identification depends upon an identification code (ID) and a password. Password security has proven to be weak: where users are allowed to select their own passwords, they tend to select ones that are easily guessed, and where passwords are assigned, the users tend to write them down. Future user identification systems should expand into something a user has (e.g. a badge) or something a user is (e.g. fingerprints). Signature verification is a technology which is worth improving since it offers good security within existing legal and social contexts. Ideally, user identification and authentication should be based upon a combination of two or more technologies.
用户标识、访问控制和审计需求
良好的计算机安全取决于知道谁在使用系统,并管理每个人如何能够访问系统上的信息。下一代计算机应该内置那种经常被添加到当今系统中的控制功能。本次会议将讨论积极识别系统用户的目标,控制他们使用计算机化资源,并为获得授权的用户和试图超越其权限的用户提供责任。传统上,用户识别依赖于识别码(ID)和密码。密码安全性已被证明是很弱的:在允许用户选择自己的密码的情况下,他们倾向于选择容易被猜到的密码,而在分配密码的情况下,用户倾向于把密码写下来。未来的用户识别系统应该扩展到用户拥有的东西(例如徽章)或用户是什么(例如指纹)。签名验证是一项值得改进的技术,因为它在现有的法律和社会环境中提供了良好的安全性。理想情况下,用户识别和身份验证应该基于两种或多种技术的组合。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信