Abstract :
The designer of secure computer systems needs to ensure that only authorised users use the system. The alternative automatic or computer aided techniques must therefore be considered. This is especially the case in distributed computing systems. The author considers: passwords, PINs and biometrics. From the latter he considers: signature; fingerprint; voice pattern; retinal patterns; hand shape and typing rhythm