Title :
Notice of Violation of IEEE Publication Principles
Immune Selection Algorithm-Based User Authentication System
Author :
Tang, Jun ; Zhao, Xiaojuan
Author_Institution :
Dept. of Inf. Eng., Hunan Urban Constr. Coll., Xiangtan, China
Abstract :
Notice of Violation of IEEE Publication Principles
"Immune Selection Algorithm-based User Authentication System"
by Jun Tang and Xiaojuan Zhao
in the Proceedings of the International Conference on Frontier of Computer Science and Technology, December 2009, pp. 377-381
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.
This paper is a near verbatim copy of the paper cited below. The original text was copied with no attribution (including appropriate references to the original author(s) and/or paper title) and without permission.
Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:
"An Investigation of Negative Authentication Systems"
by Dipankar Dasgupta and Rukhsana Azeem
in the Proceedings of thev3rd International Conference on Information Warfare and Security, April 2008
This work explores a new concept in user authentication to improve security on login process. Most authentication systems use some form positive identification (PI) to identify legitimate users. Specifically, these systems use a password profile containing all the user passwords that are authorized to access the system (or the server).
Keywords :
authorisation; immune selection algorithm; login process; password profile; positive identification; security; server access; system access; user authentication system; Authentication; Computer hacking; Computer security; Cryptography; Data security; Databases; Detectors; Immune system; Information security; Intrusion detection; Artificial immune system; Negative Authentication; Password Protection; Positive Identification; Secure Authentication;
Conference_Titel :
Frontier of Computer Science and Technology, 2009. FCST '09. Fourth International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3932-4
DOI :
10.1109/FCST.2009.15