IMPROVED SYSTEM-ACCESS CONTROL USING COMPLEMENTARY TECHNOLOGIES

Citation
L. Labuschagne et Jhp. Eloff, IMPROVED SYSTEM-ACCESS CONTROL USING COMPLEMENTARY TECHNOLOGIES, Computers & security, 16(6), 1997, pp. 543-549
Citations number
6
Categorie Soggetti
Computer Sciences, Special Topics","Computer Science Information Systems
Journal title
ISSN journal
01674048
Volume
16
Issue
6
Year of publication
1997
Pages
543 - 549
Database
ISI
SICI code
0167-4048(1997)16:6<543:ISCUCT>2.0.ZU;2-E
Abstract
Although there are many different aspects to consider when looking at IT security, one of the most tried and trusted methods of ensuring the safety of systems and data is to control people's access to them. In this article the various complementary system-access control mechanism s will be discussed. In addition, this article is aimed at demonstrati ng that in order to tighten up control and security, it is important t o think in terms of combining mechanisms by using various complementar y technologies. This article, therefore, does not necessarily make a n ew contribution to the domain of system-access control, but attempts r ather to integrate and consolidate current approaches to improve it. E mphasis is, therefore, placed on the inherent nature of the mechanisms rather than on specific technologies such as biometrics. (C) 1997 Els evier Science Ltd. All rights reserved.