Reference Hub2
End User Authentication (EUA) Model and Password for Security

End User Authentication (EUA) Model and Password for Security

George S. Oreku, Jianzhong Li
Copyright: © 2009 |Volume: 21 |Issue: 2 |Pages: 16
ISSN: 1546-2234|EISSN: 1546-5012|ISSN: 1546-2234|EISBN13: 9781615200764|EISSN: 1546-5012|DOI: 10.4018/joeuc.2009040102
Cite Article Cite Article

MLA

Oreku, George S., and Jianzhong Li. "End User Authentication (EUA) Model and Password for Security." JOEUC vol.21, no.2 2009: pp.28-43. http://doi.org/10.4018/joeuc.2009040102

APA

Oreku, G. S. & Li, J. (2009). End User Authentication (EUA) Model and Password for Security. Journal of Organizational and End User Computing (JOEUC), 21(2), 28-43. http://doi.org/10.4018/joeuc.2009040102

Chicago

Oreku, George S., and Jianzhong Li. "End User Authentication (EUA) Model and Password for Security," Journal of Organizational and End User Computing (JOEUC) 21, no.2: 28-43. http://doi.org/10.4018/joeuc.2009040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Authentication is one among a set of services that constitute a security subsystem in a modern computing or communications infrastructure. End User Authentication flexibility model proposed in this article will allow the user to have multiple authentications with varying levels of guarantee, and for suppliers to request and rely on mechanisms appropriate to the service requested. We describe the ticket used by clients, servers, model and algorithm to achieve authentication toward prevention of unauthorized access to in sourced data on applications level. An authentication to end-user proposed in this article is a simple three level ticket request model solution in an open distributed environment. We also develop an analytical password for the proposed mechanism and validate this approach through experiment. Furthermore, we explore this approach to end user authentication and demonstrate the conception of a textual password which in many cases improves the security. We analyze Deffie-Hellman exchange weakness and present how it can be made robust against attacks. Our approach is based on the use of the Kerberos authentication technique and the Diffie-Hellman Key exchange.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.