Identity verification (authentication) working group
暂无分享,去创建一个
Every reader of this report has at some time verified his or her identity to a computer system. Entry of a userid and password in response to computer prompting is the almost universal model for this simple but essential act.
[1] James A. Schweitzer,et al. A proposal for an automated logical access control standard (ALACS): a standard for computer logical access security , 1984, SGCH.
[2] Helen Marie Wood,et al. The use of passwords for controlled access to computer resources. , 1977 .
[3] Thomas A. Berson,et al. Polonius: An Identity Authentication System , 1985, 1985 IEEE Symposium on Security and Privacy.