BibTex RIS Cite
Year 2016, Volume: 5 Issue: 4, 82 - 89, 01.12.2016

Abstract

References

  • [1] E. Sediyono, K I. Santoso and JL I. Bardjo, “Secure Login by Using One-time Password Authentication Based on MD5 Hash Encrypted SMS”, Proceedings of the Advances in Computing, Communications and Informatics, Mysore, USA, pp. 1604 – 1608, 22-25 Aug. 2013. (Conference Paper)
  • [2] E. Jamhour, “Distributed security management using LDAP directories”, Computer Science Society SCCC '01. Proceedings. XXI Internatinal Conference of the Chilean, Punta Arenas, Chile, pp. 144 - 153, 07-09 November 2001. (Conference Paper)
  • [3] M. Long and U. Blumenthal, “Manageable One-Time Password for Consumer Applications”, Internationla Conference Consumer Electronics, Digest of Technical Papers. , Las Vegas, USA pp 1-2, 10-14 January. 2007. (Conference Paper)
  • [4] International Standard ISO/IEC 7816-3 Third edition 2006, https://www.iso.org/obp/ui/#iso:std:iso-iec:7816:- 3:ed-3:v1:en (Standards) Latest Access Time for the website is 21 July 2016.
  • [5] H.C. Kim, H.W. Lee, K.S Lee and M.S Jun, “A Design of One-Time Password Mechanism using Public Key Infrastructure”, Proceedings of Fouth International Conference the Networked Computing and Advanced Information Management, Gyeongju, , South Korea, vol.1, pp. 18 – 24, 2-4 September. 2008. (Conference Paper)
  • [6] D.G. Shin and M.S Jun, “Micro-payment system using OTP for customer’s anonymous”, Proceedings of the International Conference Information Science and Applications, Jeju, South Korea, pp. 1-5, 2011. (Conference Paper)
  • [7] H. Wang, C Fan, S. Yang J Zou and X Zhang, “A New Secure OpenID Authentication Mechanism Using One- Time Password (OTP)”, 7th International Conference Wireless Communications, Networking and Mobile Computing, Wuhan,China pp. 1-4, 23-25 Sept.ember 2011. (Conference Paper)
  • [8] Nail M. Haller “The S/KEY One-Time Password System” Proceedings of the. Internet Society Symposium on Network and Distributed System Security, San Diego, USA, pp.151-158, Feburary 1994. (Conference Paper)
  • [9] G Jaspher W Kathrine E Kirubakaran and P. Prakash, “Smart card based Remote User Authentication Schemes: A Survey”, Proceedings of the International Conference on Modelling Optimization and Computing, Coimbatore, India, pp. 1 – 5, 26-28 July 2012. (Conference Paper)
  • [10] PBworks, "Advantages and Disadvantages of technologies",http://biometrics.pbworks.com/w/page/14 811349/Advantages%20and%20disadvantages%20of%2 0technologies , Latest Access Time for the website is 15 May 2017
  • [11] J. P. Kumar, S. Umar, C. S. Harsha and B. Nagasai “A Study on Web Services Security”, International Journal of Computer Science Engineering and Technology, Vol 4, No. 7, pp. 235-237, July 2014. (Article)
  • [12] Y. Hu and H. Wang, “Constraints in Web Services Composition”, Proceedings of 4th International Conference Wireless Communications, Networking and Mobile Computing, Dalian, China, pp. 1-4, 12-14 Oct.ober 2008. (Conference Paper)
  • [13] Y He, J. Li and H. Tang, “Research of Heterogeneous Authentication Information Synchronization Based on LDAP and Web Service”, Proceedings of International Symposium on the Computational Intelligence and Design, Hangzhou, China Vol. 2, pp. 52 – 55, 29-31 October 2010. (Conference Paper)
  • [14] R. F. Sari and S. Hidayat, “Integrating Web Server Applications With LDAP Authentication: Case Study on Human Resources Information System of UI”, Proceedings of the International Symposium on Communications and Information Technologies, Bangkok, Thailand, pp. 307 – 312, 18-20 Octoper 2006. (Conference Paper)
  • [15] M. K. Ibrahim and W. Z. Ameen, “Secure SMS System for E-Commerce Applications”, International Journal of Computer Science Engineering and Technology, Vol. 4, No. 4, pp. 137-142, June 2014. (Article)
  • [16] E. Liao, C.C Lee, M.-S. Hwang and E Liao “A password authentication scheme over insecure networks”, Journal of Computer and System Sciences, Vol. 72, Issue 4, pp. 727–740, 2006. (Article)
  • [17] F. Monrose and A. D. Rubin, “Keystroke dynamics as a biometric for authentication”, Future Generation Computer Systems, Vol. 16, No. 4, pp. 351–359, February 2000. (Article)
  • [18] D. Shanmugapriya and G. Padmavathi, “A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges”, International Journal of Computer Science and Information Security, Vol. 5, No. 1, September, 2009. (Article)
  • [19] C. S. Yang, C. Y. Liu, J. H. Chen and C. Y. Sung, ”Design and implementation of secure Web-based LDAP management system”, Information Networking, Proceedings. 15th International Conference, Beppu, Japan, pp. 259 – 264, 31 January - 02 February 2001. (Conference Paper)
  • [20] M A. Thakur and R. Gaikwad, “User identity & lifecycle management using LDAP directory server on distributed network”, Proceedings of the International Conference Pervasive Computing, Pune, India, pp. 1-3, 8-10 January 2015. (Conference Paper)
  • [21] Y. Guo, C. X. Shen and Z. Han, ”A LDAP synchronization model based on Trusted Computing”, International Conference on Machine Learning and Cybernetics, Boading, China, pp. 2771 – 2774, 12-15 July 2009. (Conference Paper)
  • [22] S. K. Mandal and F. Basith, “Enhanced Security Framework to Ensure Data Security in Cloud Using Security Blanked Algorithm”, International Journal of Engineering and Technology, pp. 225 – 229, Vol 02, No.4, October 2013 (Article)
  • [23] H. V. Taiwade, “Enhanced Security Mechanisms for Cloud Computing” International Journal of Advanced Research in Computer Sicence and Software Enginering, pp. 564 - 567 Vol. 5, No. 7, July 2015 (Article)
  • [24] B. Balusamy, P. Venkatakrishna, G. Palani and U. Ravikumar, “An Intelligent Cloud Security System for Critical Applications”, Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, pp. 33- 40, 2015 (Article)
  • [25] Balamurugan, B., and P. Venkata Krishna. "An Enhanced Security Framework for a Cloud Application." Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, pp. 825-836, 2015 (Article)

A Practical Mechanism for Password Change of Multiple Systems in an Organisational Setting

Year 2016, Volume: 5 Issue: 4, 82 - 89, 01.12.2016

Abstract

Security policies force to clients frequently to change their password. This is particularly an issue for organisation with different administrations which require to access applications. In this paper, we propose a functional and minimal effort verification application that lessens client reliance to reset and confirm client for clients' password change on multiple sites. The proposed arrangement does not require any extra equipment for achieving new password immediately to access to organisations. The proposed framework includes utilizing a cellular telephone as a SMS based framework with checking password policy according to cloud based citizen info web service.

References

  • [1] E. Sediyono, K I. Santoso and JL I. Bardjo, “Secure Login by Using One-time Password Authentication Based on MD5 Hash Encrypted SMS”, Proceedings of the Advances in Computing, Communications and Informatics, Mysore, USA, pp. 1604 – 1608, 22-25 Aug. 2013. (Conference Paper)
  • [2] E. Jamhour, “Distributed security management using LDAP directories”, Computer Science Society SCCC '01. Proceedings. XXI Internatinal Conference of the Chilean, Punta Arenas, Chile, pp. 144 - 153, 07-09 November 2001. (Conference Paper)
  • [3] M. Long and U. Blumenthal, “Manageable One-Time Password for Consumer Applications”, Internationla Conference Consumer Electronics, Digest of Technical Papers. , Las Vegas, USA pp 1-2, 10-14 January. 2007. (Conference Paper)
  • [4] International Standard ISO/IEC 7816-3 Third edition 2006, https://www.iso.org/obp/ui/#iso:std:iso-iec:7816:- 3:ed-3:v1:en (Standards) Latest Access Time for the website is 21 July 2016.
  • [5] H.C. Kim, H.W. Lee, K.S Lee and M.S Jun, “A Design of One-Time Password Mechanism using Public Key Infrastructure”, Proceedings of Fouth International Conference the Networked Computing and Advanced Information Management, Gyeongju, , South Korea, vol.1, pp. 18 – 24, 2-4 September. 2008. (Conference Paper)
  • [6] D.G. Shin and M.S Jun, “Micro-payment system using OTP for customer’s anonymous”, Proceedings of the International Conference Information Science and Applications, Jeju, South Korea, pp. 1-5, 2011. (Conference Paper)
  • [7] H. Wang, C Fan, S. Yang J Zou and X Zhang, “A New Secure OpenID Authentication Mechanism Using One- Time Password (OTP)”, 7th International Conference Wireless Communications, Networking and Mobile Computing, Wuhan,China pp. 1-4, 23-25 Sept.ember 2011. (Conference Paper)
  • [8] Nail M. Haller “The S/KEY One-Time Password System” Proceedings of the. Internet Society Symposium on Network and Distributed System Security, San Diego, USA, pp.151-158, Feburary 1994. (Conference Paper)
  • [9] G Jaspher W Kathrine E Kirubakaran and P. Prakash, “Smart card based Remote User Authentication Schemes: A Survey”, Proceedings of the International Conference on Modelling Optimization and Computing, Coimbatore, India, pp. 1 – 5, 26-28 July 2012. (Conference Paper)
  • [10] PBworks, "Advantages and Disadvantages of technologies",http://biometrics.pbworks.com/w/page/14 811349/Advantages%20and%20disadvantages%20of%2 0technologies , Latest Access Time for the website is 15 May 2017
  • [11] J. P. Kumar, S. Umar, C. S. Harsha and B. Nagasai “A Study on Web Services Security”, International Journal of Computer Science Engineering and Technology, Vol 4, No. 7, pp. 235-237, July 2014. (Article)
  • [12] Y. Hu and H. Wang, “Constraints in Web Services Composition”, Proceedings of 4th International Conference Wireless Communications, Networking and Mobile Computing, Dalian, China, pp. 1-4, 12-14 Oct.ober 2008. (Conference Paper)
  • [13] Y He, J. Li and H. Tang, “Research of Heterogeneous Authentication Information Synchronization Based on LDAP and Web Service”, Proceedings of International Symposium on the Computational Intelligence and Design, Hangzhou, China Vol. 2, pp. 52 – 55, 29-31 October 2010. (Conference Paper)
  • [14] R. F. Sari and S. Hidayat, “Integrating Web Server Applications With LDAP Authentication: Case Study on Human Resources Information System of UI”, Proceedings of the International Symposium on Communications and Information Technologies, Bangkok, Thailand, pp. 307 – 312, 18-20 Octoper 2006. (Conference Paper)
  • [15] M. K. Ibrahim and W. Z. Ameen, “Secure SMS System for E-Commerce Applications”, International Journal of Computer Science Engineering and Technology, Vol. 4, No. 4, pp. 137-142, June 2014. (Article)
  • [16] E. Liao, C.C Lee, M.-S. Hwang and E Liao “A password authentication scheme over insecure networks”, Journal of Computer and System Sciences, Vol. 72, Issue 4, pp. 727–740, 2006. (Article)
  • [17] F. Monrose and A. D. Rubin, “Keystroke dynamics as a biometric for authentication”, Future Generation Computer Systems, Vol. 16, No. 4, pp. 351–359, February 2000. (Article)
  • [18] D. Shanmugapriya and G. Padmavathi, “A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges”, International Journal of Computer Science and Information Security, Vol. 5, No. 1, September, 2009. (Article)
  • [19] C. S. Yang, C. Y. Liu, J. H. Chen and C. Y. Sung, ”Design and implementation of secure Web-based LDAP management system”, Information Networking, Proceedings. 15th International Conference, Beppu, Japan, pp. 259 – 264, 31 January - 02 February 2001. (Conference Paper)
  • [20] M A. Thakur and R. Gaikwad, “User identity & lifecycle management using LDAP directory server on distributed network”, Proceedings of the International Conference Pervasive Computing, Pune, India, pp. 1-3, 8-10 January 2015. (Conference Paper)
  • [21] Y. Guo, C. X. Shen and Z. Han, ”A LDAP synchronization model based on Trusted Computing”, International Conference on Machine Learning and Cybernetics, Boading, China, pp. 2771 – 2774, 12-15 July 2009. (Conference Paper)
  • [22] S. K. Mandal and F. Basith, “Enhanced Security Framework to Ensure Data Security in Cloud Using Security Blanked Algorithm”, International Journal of Engineering and Technology, pp. 225 – 229, Vol 02, No.4, October 2013 (Article)
  • [23] H. V. Taiwade, “Enhanced Security Mechanisms for Cloud Computing” International Journal of Advanced Research in Computer Sicence and Software Enginering, pp. 564 - 567 Vol. 5, No. 7, July 2015 (Article)
  • [24] B. Balusamy, P. Venkatakrishna, G. Palani and U. Ravikumar, “An Intelligent Cloud Security System for Critical Applications”, Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, pp. 33- 40, 2015 (Article)
  • [25] Balamurugan, B., and P. Venkata Krishna. "An Enhanced Security Framework for a Cloud Application." Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, pp. 825-836, 2015 (Article)
There are 25 citations in total.

Details

Primary Language English
Journal Section Research Article
Authors

Ruhi Tas

Ozgur Tanriover This is me

Publication Date December 1, 2016
Published in Issue Year 2016 Volume: 5 Issue: 4

Cite

IEEE R. Tas and O. Tanriover, “A Practical Mechanism for Password Change of Multiple Systems in an Organisational Setting”, IJISS, vol. 5, no. 4, pp. 82–89, 2016.