A low-cost secure schemes for authentications and access control with the use of multiple public IC cards

Kuo Yi Chen, Chin Yang Lin, Ting-Wei Hou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In the present day, the requirements of security in modern information systems are increasing significantly. Among secure requirements, the personal identification plays an important role for authentications and access control. However, traditional id/password pairs could be disabled by modern hacking techniques and social engineering easily. In order to provide stronger access control for organizations, personal identification tokens are widely used in the present day. With the features, unique and un duplicable, personal identification tokens could be used to provide strong reliability for user authentication. However, the cost of issuing a propriety identification tokens for each employee could be expensive. The high cost may block the managers to adopt token-based secure schemes, and then reduce the secure levels of organizations. In this paper, a low-cost secure scheme is proposed. This scheme is based on widely used public cards which employees would have by themselves. The combination of multiple public cards can be used to build strong secure protections by weight-calculating algorithms, and then provide adaptable secure levels for each user. Thus organizations could have strong secure protections without additional cost.

Original languageEnglish
Title of host publicationICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings
DOIs
Publication statusPublished - 2010 Nov 15
Event2010 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE 2010 - Chengdu, China
Duration: 2010 Aug 202010 Aug 22

Publication series

NameICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings
Volume3

Other

Other2010 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE 2010
CountryChina
CityChengdu
Period10-08-2010-08-22

Fingerprint

Access Control
Access control
Authentication
Costs
Personnel
User Authentication
Password
Requirements
Information Systems
Information systems
Managers
Engineering

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Theoretical Computer Science

Cite this

Chen, K. Y., Lin, C. Y., & Hou, T-W. (2010). A low-cost secure schemes for authentications and access control with the use of multiple public IC cards. In ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings [5579553] (ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings; Vol. 3). https://doi.org/10.1109/ICACTE.2010.5579553
Chen, Kuo Yi ; Lin, Chin Yang ; Hou, Ting-Wei. / A low-cost secure schemes for authentications and access control with the use of multiple public IC cards. ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings. 2010. (ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings).
@inproceedings{4040a479d5f0477baf6e52dcb8d82ea1,
title = "A low-cost secure schemes for authentications and access control with the use of multiple public IC cards",
abstract = "In the present day, the requirements of security in modern information systems are increasing significantly. Among secure requirements, the personal identification plays an important role for authentications and access control. However, traditional id/password pairs could be disabled by modern hacking techniques and social engineering easily. In order to provide stronger access control for organizations, personal identification tokens are widely used in the present day. With the features, unique and un duplicable, personal identification tokens could be used to provide strong reliability for user authentication. However, the cost of issuing a propriety identification tokens for each employee could be expensive. The high cost may block the managers to adopt token-based secure schemes, and then reduce the secure levels of organizations. In this paper, a low-cost secure scheme is proposed. This scheme is based on widely used public cards which employees would have by themselves. The combination of multiple public cards can be used to build strong secure protections by weight-calculating algorithms, and then provide adaptable secure levels for each user. Thus organizations could have strong secure protections without additional cost.",
author = "Chen, {Kuo Yi} and Lin, {Chin Yang} and Ting-Wei Hou",
year = "2010",
month = "11",
day = "15",
doi = "10.1109/ICACTE.2010.5579553",
language = "English",
isbn = "9781424465408",
series = "ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings",
booktitle = "ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings",

}

Chen, KY, Lin, CY & Hou, T-W 2010, A low-cost secure schemes for authentications and access control with the use of multiple public IC cards. in ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings., 5579553, ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings, vol. 3, 2010 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE 2010, Chengdu, China, 10-08-20. https://doi.org/10.1109/ICACTE.2010.5579553

A low-cost secure schemes for authentications and access control with the use of multiple public IC cards. / Chen, Kuo Yi; Lin, Chin Yang; Hou, Ting-Wei.

ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings. 2010. 5579553 (ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings; Vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - A low-cost secure schemes for authentications and access control with the use of multiple public IC cards

AU - Chen, Kuo Yi

AU - Lin, Chin Yang

AU - Hou, Ting-Wei

PY - 2010/11/15

Y1 - 2010/11/15

N2 - In the present day, the requirements of security in modern information systems are increasing significantly. Among secure requirements, the personal identification plays an important role for authentications and access control. However, traditional id/password pairs could be disabled by modern hacking techniques and social engineering easily. In order to provide stronger access control for organizations, personal identification tokens are widely used in the present day. With the features, unique and un duplicable, personal identification tokens could be used to provide strong reliability for user authentication. However, the cost of issuing a propriety identification tokens for each employee could be expensive. The high cost may block the managers to adopt token-based secure schemes, and then reduce the secure levels of organizations. In this paper, a low-cost secure scheme is proposed. This scheme is based on widely used public cards which employees would have by themselves. The combination of multiple public cards can be used to build strong secure protections by weight-calculating algorithms, and then provide adaptable secure levels for each user. Thus organizations could have strong secure protections without additional cost.

AB - In the present day, the requirements of security in modern information systems are increasing significantly. Among secure requirements, the personal identification plays an important role for authentications and access control. However, traditional id/password pairs could be disabled by modern hacking techniques and social engineering easily. In order to provide stronger access control for organizations, personal identification tokens are widely used in the present day. With the features, unique and un duplicable, personal identification tokens could be used to provide strong reliability for user authentication. However, the cost of issuing a propriety identification tokens for each employee could be expensive. The high cost may block the managers to adopt token-based secure schemes, and then reduce the secure levels of organizations. In this paper, a low-cost secure scheme is proposed. This scheme is based on widely used public cards which employees would have by themselves. The combination of multiple public cards can be used to build strong secure protections by weight-calculating algorithms, and then provide adaptable secure levels for each user. Thus organizations could have strong secure protections without additional cost.

UR - http://www.scopus.com/inward/record.url?scp=78149327540&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78149327540&partnerID=8YFLogxK

U2 - 10.1109/ICACTE.2010.5579553

DO - 10.1109/ICACTE.2010.5579553

M3 - Conference contribution

SN - 9781424465408

T3 - ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings

BT - ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings

ER -

Chen KY, Lin CY, Hou T-W. A low-cost secure schemes for authentications and access control with the use of multiple public IC cards. In ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings. 2010. 5579553. (ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings). https://doi.org/10.1109/ICACTE.2010.5579553