Abstract | ||
---|---|---|
The widespread use of remote computer resources has made the problem of personal authentication most urgent. This paper examines the use of passwords for controlled access to these resources. Password techniques, ways of protecting passwords, and attendant cost considerations are discussed. Similarities between passwords and data encryption keys are noted and general recommendations for the use of passwords are presented. |
Year | DOI | Venue |
---|---|---|
1977 | 10.1145/1499402.1499410 | AFIPS National Computer Conference |
Keywords | Field | DocType |
personal authentication,remote computer resource,remote computer system,widespread use,general recommendation,attendant cost consideration,data encryption key,password technique,controlled access | Computer resources,Computer access control,Internet privacy,Authentication,Computer science,Computer security,Password psychology,Encryption,Password policy,Password,Cognitive password | Conference |
Citations | PageRank | References |
14 | 34.28 | 13 |
Authors | ||
1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Helen M. Wood | 1 | 29 | 44.50 |