Title :
Network authentication tokens
Author_Institution :
Ford Aerosp., Reston, VA, USA
Abstract :
Network users may be authenticated by different means and from a variety of locations. Once authenticated, the user´s access should be consistent with the strength of the authentication. The author examines one possible method for determining the authentication strength and conveying this information within a distributed network. The approach discussed uses a token composed of a unique user ID and an authentication level. The token is sent along with the request for establishing a remote session. Once the token is received, the remote location determines user access based solely on the authentication token
Keywords :
computer networks; distributed processing; security of data; authentication; authentication tokens; distributed network; user ID; user´s access; Access control; Aerodynamics; Authentication; Biometrics; Cryptography; Databases; Fingerprint recognition; Hardware; Retina; Smart cards;
Conference_Titel :
Computer Security Applications Conference, 1989., Fifth Annual
Conference_Location :
Tucson, AZ
Print_ISBN :
0-8186-2006-4
DOI :
10.1109/CSAC.1989.81056