Abstract
In 1998, Jan and Tseng proposed two integrated schemes of user authentication and access control which can be used to implement a protection system in distributed computer systems. This paper will analyze the security of both schemes and show that an intruder can easily forge a login, be accepted and logged in as a legal user, and access system resources. We will then propose a modified scheme to withstand our proposed attacks.
Original language | English |
---|---|
Pages (from-to) | 386-391 |
Number of pages | 6 |
Journal | IEICE Transactions on Information and Systems |
Volume | E85-D |
Issue number | 2 |
Publication status | Published - 2002 Feb |
All Science Journal Classification (ASJC) codes
- Software
- Hardware and Architecture
- Computer Vision and Pattern Recognition
- Electrical and Electronic Engineering
- Artificial Intelligence