Distributed authentication for resource control
This thesis examines distributed authentication in the process of controlling computing resources. We investigate user sign-on and two of the main authentication technologies that can be used to control a resource through authentication and providing additional security services. The problems with t...
Main Author: | Burdis, Keith Robert |
---|---|
Format: | Others |
Language: | English |
Published: |
Rhodes University
2000
|
Subjects: | |
Online Access: | http://hdl.handle.net/10962/d1006512 |
Similar Items
-
Designing and implementing a network authentication service for providing a secure communication channel
by: Chance, Christopher P
Published: (2011) -
Enabling e-learning 2.0 in information security education: a semantic web approach
by: Goss, Ryan Gavin
Published: (2009) -
A framework towards effective control in information security governance
by: Viljoen, Melanie
Published: (2009) -
Security of distributed data systems
by: Finch, Steven D.
Published: (2011) -
METHODOLOGY FOR THE OPTIMIZATION OF RESOURCES IN THE DETECTION OF COMPUTER FRAUD.
by: DUNN, THURMAN STANLEY.
Published: (1982)