C. Nwankwo, Wifred Adigwe, Wilson Nwankwo, Anazia E. Kizito, S. Konyeha, Francis Uwadia
{"title":"一种用于互联系统访问控制的改进密码认证模型","authors":"C. Nwankwo, Wifred Adigwe, Wilson Nwankwo, Anazia E. Kizito, S. Konyeha, Francis Uwadia","doi":"10.1109/ITED56637.2022.10051179","DOIUrl":null,"url":null,"abstract":"Data breaches and information theft are among the major challenges confronting the legitimate information system user in the 21st century. In recent times, following the deepening of the digital space, mobile computing devices have become convenient resources to drive most day-to-day socioeconomic efforts. These devices are valuable as they host sensitive data, which if compromised may result to economic chaos. Consequently, strengthening access control measures becomes crucial. This study focuses on the strengths of the traditional password authentication mechanisms used on information systems. It identified the weaknesses and proposes a two-part improved password authentication model. The object-oriented methodology is adopted to analyse the components of the proposed password authentication cycle including the flow of activities, and the security relationships. Following a detailed analysis, we specify a simple algorithm to guide the implementation of the model.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"10 9","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Improved Password-authentication Model for Access Control in Connected Systems\",\"authors\":\"C. Nwankwo, Wifred Adigwe, Wilson Nwankwo, Anazia E. Kizito, S. Konyeha, Francis Uwadia\",\"doi\":\"10.1109/ITED56637.2022.10051179\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data breaches and information theft are among the major challenges confronting the legitimate information system user in the 21st century. In recent times, following the deepening of the digital space, mobile computing devices have become convenient resources to drive most day-to-day socioeconomic efforts. These devices are valuable as they host sensitive data, which if compromised may result to economic chaos. Consequently, strengthening access control measures becomes crucial. This study focuses on the strengths of the traditional password authentication mechanisms used on information systems. It identified the weaknesses and proposes a two-part improved password authentication model. The object-oriented methodology is adopted to analyse the components of the proposed password authentication cycle including the flow of activities, and the security relationships. Following a detailed analysis, we specify a simple algorithm to guide the implementation of the model.\",\"PeriodicalId\":246041,\"journal\":{\"name\":\"2022 5th Information Technology for Education and Development (ITED)\",\"volume\":\"10 9\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th Information Technology for Education and Development (ITED)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITED56637.2022.10051179\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th Information Technology for Education and Development (ITED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITED56637.2022.10051179","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Improved Password-authentication Model for Access Control in Connected Systems
Data breaches and information theft are among the major challenges confronting the legitimate information system user in the 21st century. In recent times, following the deepening of the digital space, mobile computing devices have become convenient resources to drive most day-to-day socioeconomic efforts. These devices are valuable as they host sensitive data, which if compromised may result to economic chaos. Consequently, strengthening access control measures becomes crucial. This study focuses on the strengths of the traditional password authentication mechanisms used on information systems. It identified the weaknesses and proposes a two-part improved password authentication model. The object-oriented methodology is adopted to analyse the components of the proposed password authentication cycle including the flow of activities, and the security relationships. Following a detailed analysis, we specify a simple algorithm to guide the implementation of the model.