基于Web应用的认证系统

S. Akram, S. Joshi, Rajesh Deorari
{"title":"基于Web应用的认证系统","authors":"S. Akram, S. Joshi, Rajesh Deorari","doi":"10.1109/IIHC55949.2022.10059984","DOIUrl":null,"url":null,"abstract":"Authentication is one of the primary problems with system security. The key component of the access control process to prevent unauthorised users from accessing data and resources is authentication, which may be described as the act of verifying a user's identity. The validity of the user cannot be guaranteed by a static technique of authentication. This led to the development of more cutting-edge authentication techniques. To increase the system's security, two factor authentication was initially deployed, followed by multi factor authentication. Later, adaptive authentication was added and it also had some problems. When authenticating a user in this study, an unique collection of user features was taken into account. A performance optimization technique was included since this research takes many user factors into account, and it improved performance by 25%.","PeriodicalId":114883,"journal":{"name":"2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Web Application Based Authentication System\",\"authors\":\"S. Akram, S. Joshi, Rajesh Deorari\",\"doi\":\"10.1109/IIHC55949.2022.10059984\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Authentication is one of the primary problems with system security. The key component of the access control process to prevent unauthorised users from accessing data and resources is authentication, which may be described as the act of verifying a user's identity. The validity of the user cannot be guaranteed by a static technique of authentication. This led to the development of more cutting-edge authentication techniques. To increase the system's security, two factor authentication was initially deployed, followed by multi factor authentication. Later, adaptive authentication was added and it also had some problems. When authenticating a user in this study, an unique collection of user features was taken into account. A performance optimization technique was included since this research takes many user factors into account, and it improved performance by 25%.\",\"PeriodicalId\":114883,\"journal\":{\"name\":\"2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IIHC55949.2022.10059984\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIHC55949.2022.10059984","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

身份验证是系统安全性的主要问题之一。防止未经授权的用户访问数据和资源的访问控制过程的关键组成部分是身份验证,这可以描述为验证用户身份的行为。静态身份验证技术无法保证用户的有效性。这导致了更先进的身份验证技术的发展。为了提高系统的安全性,首先部署了双因素认证,然后是多因素认证。后来加入了自适应身份验证,也出现了一些问题。在本研究中对用户进行身份验证时,考虑了用户特征的独特集合。由于本研究考虑了许多用户因素,因此包含了性能优化技术,性能提高了25%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Web Application Based Authentication System
Authentication is one of the primary problems with system security. The key component of the access control process to prevent unauthorised users from accessing data and resources is authentication, which may be described as the act of verifying a user's identity. The validity of the user cannot be guaranteed by a static technique of authentication. This led to the development of more cutting-edge authentication techniques. To increase the system's security, two factor authentication was initially deployed, followed by multi factor authentication. Later, adaptive authentication was added and it also had some problems. When authenticating a user in this study, an unique collection of user features was taken into account. A performance optimization technique was included since this research takes many user factors into account, and it improved performance by 25%.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信