Year 2016,
Volume: 5 Issue: 4, 82 - 89, 01.12.2016
Ruhi Tas
,
Ozgur Tanriover
References
- [1] E. Sediyono, K I. Santoso and JL I. Bardjo, “Secure
Login by Using One-time Password Authentication
Based on MD5 Hash Encrypted SMS”, Proceedings of
the Advances in Computing, Communications and
Informatics, Mysore, USA, pp. 1604 – 1608, 22-25 Aug.
2013. (Conference Paper)
- [2] E. Jamhour, “Distributed security management using LDAP directories”, Computer Science Society SCCC
'01. Proceedings. XXI Internatinal Conference of the
Chilean, Punta Arenas, Chile, pp. 144 - 153, 07-09
November 2001. (Conference Paper)
- [3] M. Long and U. Blumenthal, “Manageable One-Time
Password for Consumer Applications”, Internationla
Conference Consumer Electronics, Digest of Technical
Papers. , Las Vegas, USA pp 1-2, 10-14 January. 2007. (Conference Paper)
- [4] International Standard ISO/IEC 7816-3 Third edition
2006, https://www.iso.org/obp/ui/#iso:std:iso-iec:7816:- 3:ed-3:v1:en (Standards) Latest Access Time for the
website is 21 July 2016.
- [5] H.C. Kim, H.W. Lee, K.S Lee and M.S Jun, “A Design
of One-Time Password Mechanism using Public Key
Infrastructure”, Proceedings of Fouth International
Conference the Networked Computing and Advanced
Information Management, Gyeongju, , South Korea,
vol.1, pp. 18 – 24, 2-4 September. 2008. (Conference
Paper)
- [6] D.G. Shin and M.S Jun, “Micro-payment system using
OTP for customer’s anonymous”, Proceedings of the
International Conference Information Science and
Applications, Jeju, South Korea, pp. 1-5, 2011.
(Conference Paper)
- [7] H. Wang, C Fan, S. Yang J Zou and X Zhang, “A New
Secure OpenID Authentication Mechanism Using One- Time Password (OTP)”, 7th International Conference
Wireless Communications, Networking and Mobile Computing, Wuhan,China pp. 1-4, 23-25 Sept.ember
2011. (Conference Paper)
- [8] Nail M. Haller “The S/KEY One-Time Password
System” Proceedings of the. Internet Society
Symposium on Network and Distributed System
Security, San Diego, USA, pp.151-158, Feburary 1994.
(Conference Paper)
- [9] G Jaspher W Kathrine E Kirubakaran and P. Prakash,
“Smart card based Remote User Authentication
Schemes: A Survey”, Proceedings of the International
Conference on Modelling Optimization and Computing,
Coimbatore, India, pp. 1 – 5, 26-28 July 2012. (Conference Paper)
- [10] PBworks, "Advantages and Disadvantages of technologies",http://biometrics.pbworks.com/w/page/14
811349/Advantages%20and%20disadvantages%20of%2
0technologies , Latest Access Time for the website is 15
May 2017
- [11] J. P. Kumar, S. Umar, C. S. Harsha and B. Nagasai “A
Study on Web Services Security”, International Journal
of Computer Science Engineering and Technology, Vol
4, No. 7, pp. 235-237, July 2014. (Article)
- [12] Y. Hu and H. Wang, “Constraints in Web Services
Composition”, Proceedings of 4th International
Conference Wireless Communications, Networking and Mobile Computing, Dalian, China, pp. 1-4, 12-14
Oct.ober 2008. (Conference Paper)
- [13] Y He, J. Li and H. Tang, “Research of Heterogeneous
Authentication Information Synchronization Based on LDAP and Web Service”, Proceedings of International
Symposium on the Computational Intelligence and Design, Hangzhou, China Vol. 2, pp. 52 – 55, 29-31
October 2010. (Conference Paper)
- [14] R. F. Sari and S. Hidayat, “Integrating Web Server Applications With LDAP Authentication: Case Study on
Human Resources Information System of UI”,
Proceedings of the International Symposium on
Communications and Information Technologies, Bangkok, Thailand, pp. 307 – 312, 18-20 Octoper 2006. (Conference Paper)
- [15] M. K. Ibrahim and W. Z. Ameen, “Secure SMS System
for E-Commerce Applications”, International Journal of Computer Science Engineering and Technology, Vol. 4,
No. 4, pp. 137-142, June 2014. (Article)
- [16] E. Liao, C.C Lee, M.-S. Hwang and E Liao “A password authentication scheme over insecure networks”, Journal
of Computer and System Sciences, Vol. 72, Issue 4, pp.
727–740, 2006. (Article)
- [17] F. Monrose and A. D. Rubin, “Keystroke dynamics as a
biometric for authentication”, Future Generation
Computer Systems, Vol. 16, No. 4, pp. 351–359,
February 2000. (Article)
- [18] D. Shanmugapriya and G. Padmavathi, “A Survey of
Biometric keystroke Dynamics: Approaches, Security
and Challenges”, International Journal of Computer
Science and Information Security, Vol. 5, No. 1,
September, 2009. (Article)
- [19] C. S. Yang, C. Y. Liu, J. H. Chen and C. Y. Sung, ”Design and implementation of secure Web-based
LDAP management system”, Information Networking,
Proceedings. 15th International Conference, Beppu, Japan, pp. 259 – 264, 31 January - 02 February 2001. (Conference Paper)
- [20] M A. Thakur and R. Gaikwad, “User identity & lifecycle
management using LDAP directory server on distributed
network”, Proceedings of the International Conference
Pervasive Computing, Pune, India, pp. 1-3, 8-10
January 2015. (Conference Paper)
- [21] Y. Guo, C. X. Shen and Z. Han, ”A LDAP
synchronization model based on Trusted Computing”,
International Conference on Machine Learning and
Cybernetics, Boading, China, pp. 2771 – 2774, 12-15
July 2009. (Conference Paper)
- [22] S. K. Mandal and F. Basith, “Enhanced Security
Framework to Ensure Data Security in Cloud Using
Security Blanked Algorithm”, International Journal of
Engineering and Technology, pp. 225 – 229, Vol 02,
No.4, October 2013 (Article)
- [23] H. V. Taiwade, “Enhanced Security Mechanisms for
Cloud Computing” International Journal of Advanced
Research in Computer Sicence and Software Enginering,
pp. 564 - 567 Vol. 5, No. 7, July 2015 (Article)
- [24] B. Balusamy, P. Venkatakrishna, G. Palani and U.
Ravikumar, “An Intelligent Cloud Security System for
Critical Applications”, Artificial Intelligence and
Evolutionary Algorithms in Engineering Systems, pp.
33- 40, 2015 (Article)
- [25] Balamurugan, B., and P. Venkata Krishna. "An
Enhanced Security Framework for a Cloud Application."
Artificial Intelligence and Evolutionary Algorithms in
Engineering Systems, pp. 825-836, 2015 (Article)
A Practical Mechanism for Password Change of Multiple Systems in an Organisational Setting
Year 2016,
Volume: 5 Issue: 4, 82 - 89, 01.12.2016
Ruhi Tas
,
Ozgur Tanriover
Abstract
Security policies force to clients frequently to change their password. This is particularly an issue for organisation with different administrations which require to access applications. In this paper, we propose a functional and minimal effort verification application that lessens client reliance to reset and confirm client for clients' password change on multiple sites. The proposed arrangement does not require any extra equipment for achieving new password immediately to access to organisations. The proposed framework includes utilizing a cellular telephone as a SMS based framework with checking password policy according to cloud based citizen info web service.
References
- [1] E. Sediyono, K I. Santoso and JL I. Bardjo, “Secure
Login by Using One-time Password Authentication
Based on MD5 Hash Encrypted SMS”, Proceedings of
the Advances in Computing, Communications and
Informatics, Mysore, USA, pp. 1604 – 1608, 22-25 Aug.
2013. (Conference Paper)
- [2] E. Jamhour, “Distributed security management using LDAP directories”, Computer Science Society SCCC
'01. Proceedings. XXI Internatinal Conference of the
Chilean, Punta Arenas, Chile, pp. 144 - 153, 07-09
November 2001. (Conference Paper)
- [3] M. Long and U. Blumenthal, “Manageable One-Time
Password for Consumer Applications”, Internationla
Conference Consumer Electronics, Digest of Technical
Papers. , Las Vegas, USA pp 1-2, 10-14 January. 2007. (Conference Paper)
- [4] International Standard ISO/IEC 7816-3 Third edition
2006, https://www.iso.org/obp/ui/#iso:std:iso-iec:7816:- 3:ed-3:v1:en (Standards) Latest Access Time for the
website is 21 July 2016.
- [5] H.C. Kim, H.W. Lee, K.S Lee and M.S Jun, “A Design
of One-Time Password Mechanism using Public Key
Infrastructure”, Proceedings of Fouth International
Conference the Networked Computing and Advanced
Information Management, Gyeongju, , South Korea,
vol.1, pp. 18 – 24, 2-4 September. 2008. (Conference
Paper)
- [6] D.G. Shin and M.S Jun, “Micro-payment system using
OTP for customer’s anonymous”, Proceedings of the
International Conference Information Science and
Applications, Jeju, South Korea, pp. 1-5, 2011.
(Conference Paper)
- [7] H. Wang, C Fan, S. Yang J Zou and X Zhang, “A New
Secure OpenID Authentication Mechanism Using One- Time Password (OTP)”, 7th International Conference
Wireless Communications, Networking and Mobile Computing, Wuhan,China pp. 1-4, 23-25 Sept.ember
2011. (Conference Paper)
- [8] Nail M. Haller “The S/KEY One-Time Password
System” Proceedings of the. Internet Society
Symposium on Network and Distributed System
Security, San Diego, USA, pp.151-158, Feburary 1994.
(Conference Paper)
- [9] G Jaspher W Kathrine E Kirubakaran and P. Prakash,
“Smart card based Remote User Authentication
Schemes: A Survey”, Proceedings of the International
Conference on Modelling Optimization and Computing,
Coimbatore, India, pp. 1 – 5, 26-28 July 2012. (Conference Paper)
- [10] PBworks, "Advantages and Disadvantages of technologies",http://biometrics.pbworks.com/w/page/14
811349/Advantages%20and%20disadvantages%20of%2
0technologies , Latest Access Time for the website is 15
May 2017
- [11] J. P. Kumar, S. Umar, C. S. Harsha and B. Nagasai “A
Study on Web Services Security”, International Journal
of Computer Science Engineering and Technology, Vol
4, No. 7, pp. 235-237, July 2014. (Article)
- [12] Y. Hu and H. Wang, “Constraints in Web Services
Composition”, Proceedings of 4th International
Conference Wireless Communications, Networking and Mobile Computing, Dalian, China, pp. 1-4, 12-14
Oct.ober 2008. (Conference Paper)
- [13] Y He, J. Li and H. Tang, “Research of Heterogeneous
Authentication Information Synchronization Based on LDAP and Web Service”, Proceedings of International
Symposium on the Computational Intelligence and Design, Hangzhou, China Vol. 2, pp. 52 – 55, 29-31
October 2010. (Conference Paper)
- [14] R. F. Sari and S. Hidayat, “Integrating Web Server Applications With LDAP Authentication: Case Study on
Human Resources Information System of UI”,
Proceedings of the International Symposium on
Communications and Information Technologies, Bangkok, Thailand, pp. 307 – 312, 18-20 Octoper 2006. (Conference Paper)
- [15] M. K. Ibrahim and W. Z. Ameen, “Secure SMS System
for E-Commerce Applications”, International Journal of Computer Science Engineering and Technology, Vol. 4,
No. 4, pp. 137-142, June 2014. (Article)
- [16] E. Liao, C.C Lee, M.-S. Hwang and E Liao “A password authentication scheme over insecure networks”, Journal
of Computer and System Sciences, Vol. 72, Issue 4, pp.
727–740, 2006. (Article)
- [17] F. Monrose and A. D. Rubin, “Keystroke dynamics as a
biometric for authentication”, Future Generation
Computer Systems, Vol. 16, No. 4, pp. 351–359,
February 2000. (Article)
- [18] D. Shanmugapriya and G. Padmavathi, “A Survey of
Biometric keystroke Dynamics: Approaches, Security
and Challenges”, International Journal of Computer
Science and Information Security, Vol. 5, No. 1,
September, 2009. (Article)
- [19] C. S. Yang, C. Y. Liu, J. H. Chen and C. Y. Sung, ”Design and implementation of secure Web-based
LDAP management system”, Information Networking,
Proceedings. 15th International Conference, Beppu, Japan, pp. 259 – 264, 31 January - 02 February 2001. (Conference Paper)
- [20] M A. Thakur and R. Gaikwad, “User identity & lifecycle
management using LDAP directory server on distributed
network”, Proceedings of the International Conference
Pervasive Computing, Pune, India, pp. 1-3, 8-10
January 2015. (Conference Paper)
- [21] Y. Guo, C. X. Shen and Z. Han, ”A LDAP
synchronization model based on Trusted Computing”,
International Conference on Machine Learning and
Cybernetics, Boading, China, pp. 2771 – 2774, 12-15
July 2009. (Conference Paper)
- [22] S. K. Mandal and F. Basith, “Enhanced Security
Framework to Ensure Data Security in Cloud Using
Security Blanked Algorithm”, International Journal of
Engineering and Technology, pp. 225 – 229, Vol 02,
No.4, October 2013 (Article)
- [23] H. V. Taiwade, “Enhanced Security Mechanisms for
Cloud Computing” International Journal of Advanced
Research in Computer Sicence and Software Enginering,
pp. 564 - 567 Vol. 5, No. 7, July 2015 (Article)
- [24] B. Balusamy, P. Venkatakrishna, G. Palani and U.
Ravikumar, “An Intelligent Cloud Security System for
Critical Applications”, Artificial Intelligence and
Evolutionary Algorithms in Engineering Systems, pp.
33- 40, 2015 (Article)
- [25] Balamurugan, B., and P. Venkata Krishna. "An
Enhanced Security Framework for a Cloud Application."
Artificial Intelligence and Evolutionary Algorithms in
Engineering Systems, pp. 825-836, 2015 (Article)