The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Username/Password combination is currently the most commonly deployed authentication method for a large number of applications. The databases of stored credentials are a high-profile target for malicious attackers who are performing advanced attacks to break into servers for stealing and cracking password hashes. Consequently, relying on the classical authentication scheme may not be usually an effective...
Electronic voting is often seen as a tool for making the electoral process more efficient and for increasing trust in its management. It is a decision system which summarizes opinion of a large set of users. This work aims to create a decision system which can be customized for various applications. The goal of the decision system is to remain low cost and portable. While adhering to these goals,...
Collaborative e-Science applications often need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the plethora of security protocols available and requirements for scalable, robust, and highly available implementations. Globus Nexus is a professionally hosted Platform-as-a-Service that provides these capabilities...
Successful out-of-band authentication in popular languages such as PHP has proven to be problematic and in many ways unsafe as dynamically typed languages allow for more than one ways of doing things, and the standards set out are usually not followed. It is true that out-of-band authentication using SMS messaging enhances the security of simple passwords specified by users, however many times the...
The Brazilian Tele-health Program supports the development of information and communication technologies focusing the improvement of the primary health care (PHC) and the increase of the number of actions supplied by the PHC teams. In this context, this work presents the tele-health platform Salus which has been built to support the implementation of the Brazilian Tele-health Program in the Espírito...
In multifarious information platforms, the request for security is becoming more and more important. So using secure and credible authentication mode to enhance security of system is very significant. Firstly, this paper introduces the LDAP and JBoss, then analyses the theory and characteristics of authentication mode based on those, finally it summarizes the strongpoint of this mode.
This document describes a new way to verify the identity of users in learning management systems (LMS) used at Higher Education. The starting point is to study the needs demanded by the new Distance Education model. After the study of possible security risks in the new environment, we conclude that the use of biometrics (fingerprint) tools provide a good mechanism to check the user identity. In this...
In this paper, we have designed a high-security e-mail system using dynamic password and fingerprint recognition to solve the shortages of traditional system. In order to guarantee the security of users' fingerprint characteristic value, we encrypt it with dynamic password. Using a two-way authentication method, not only ensure authentication server can recognize the users, but also guarantee the...
Password-based systems and, more generally, authentication systems based on something you know, are commonplace on the Internet. Web applications using these systems can be the target of brute force login attacks, in which an attacker tries to compromise a given account or any user account on the system. These applications rarely implement effective protection mechanisms against these attacks. In...
Many web sites have features that are only accessible after registering a user account on them. These sites include forums, on-line games, corporate Intranets and many on-line shops. The sites are typically secured through a system whereby a user chooses both a unique user name and a password that will be used to authenticate them. An alternative system proposed here is more convenient for users,...
The D-OBE (Distributed Office By Example) language for distributed office information systems is introduced. D-OBE is an extension of the OBE (Office By Example) and QBE (Query By Example) languages. A major problem was the design of a language simple enough for office workers and yet sufficiently powerful to handle the many facilities of a distributed office system. It is suggested that D-OBE achieves...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.