Computer networks -- Security measures -- Software
Subject
Subject Source: Library Of Congress Subject Headings
Found in 3 Collections and/or Records:
Security characteristics of internet username and password authentication systems : an analysis of the strengths and weaknesses of current and future authentication systems, 2012
Item — Call number MU Thesis Car
Identifier: b4175556
Abstract
Web authentication systems use username and password mechanisms as the primary control for authorizing access to sensitive data and other resources of the Internet. While most Internet users view authentication systems as secure and usable, much research shows and many security experts believe that this view and the current authentication systems promote bad habits that result in loss of security, which poses real dangers to the Internet. Because site-centric authentication models result...
Dates:
2012
Found in:
Monmouth University Library Archives
Single sign-on implementation and interoperability interface to inter-organizational workflows, 2008
Item — Call number MU Thesis Mon[t]
Identifier: b2090065
Abstract
The ability to communicate between workflows from different organizations is a mandatory feature that is here to stay. With the need to seamlessly share information comes the necessity to protect proprietary information from unauthorized partners. The work presented in this thesis expands the inter-organizational workflow tool previously developed at Monmouth University, in the Software Engineering Department, in several dimensions. The first, and most important, is the addition of a...
Dates:
2008
Found in:
Monmouth University Library Archives
Telephone Intrusion Detection System, 2000
Item — Call number MU Thesis Wal
Identifier: b2194802
Abstract
Since the advent of computer data networking, large and small business corporations, the banking industry, government, and military organizations, and today even the personal home computer user have all raised the concern for network security. Extensive research and development efforts have been exerted to develop sophisticated firewall and intrusion detection technologies. Most of these technologies are designed to monitor the gateways of local networks to the public Internet....
Dates:
2000
Found in:
Monmouth University Library Archives