USER AUTHENTICATION SECURITY
DOI:
https://doi.org/10.17770/het2017.21.3555Keywords:
Authentication, identification, identity, security, userAbstract
Nowadays, the rapid development of technology and increased amount of data that must be processed and stored. All stakeholders are interested in security level of their system. To improve security, specific process was created, which will help identify the user, and only then give him access. As a result, developed process – authentication, it’s purpose of this is to improve user identification process, and to let him go further. In the end, as a result, this process either allows the user to work with the system, or rejects it because incorrect data was received by system. Often, the authentication process is based on some secret element that both the system and the user himself knows about. As an example it can be system’s provided login and password, some readable element, or even fingerprints.Downloads
Download data is not yet available.
References
https://lv.wikipedia.org/wiki/Autentifikācija
http://ru.wikipedia.org/wiki/Аутентификация
https://en.wikipedia.org/wiki/Authentication
https://www.esidross.lv/2013/02/19/divpakapju-autentifikacija/
https://cert.lv/uploads/Pasākumi/1-Informacijas_sistemu_drosiba.pdf
http://odo.lv/Training/EServicesSecurityConcepts
Downloads
Published
2017-04-19
Issue
Section
Information technology, mechatronics, electronics
How to Cite
[1]
A. Lastovskis and P. Grabusts, “USER AUTHENTICATION SECURITY”, HET, no. 21, pp. 158–163, Apr. 2017, doi: 10.17770/het2017.21.3555.