General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Mia Hu
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • E-mail: ijcte@iacsitp.com
    • Journal Metrics:

Editor-in-chief
Prof. Mehmet Sahinoglu
Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2011 Vol.3(1): 58-63 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2011.V3.283

Role Based Authentication Schemes for Security Automation

Dharmendra Choukse and Umesh Kumar Singh

Abstract—Academy Automation implies to the various different computing hardware and software that can be used to digitally create, manipulate, collect, store, and relay Academy information needed for accomplishing basic Operation like admissions and registration to finance, student and faculty interaction, online library, medical and business development. Raw data storage, electronic transfer, and the management of electronic business information comprise the basic activities of an Academy automation system. The main aim of this work was to design and implement a Role Based Authentication (RBA) System wherein each user has certain roles allotted to him/her which defines the user’s limits and capabilities of making changes, accessing various areas of the software and transferring/allotting these roles recursively. Strict security measures had kept in mind while designing such a system and proper encryption and decryption techniques are used at both ends to prevent any possibility of any third party attacks. Further, various new age authentication techniques like Open ID and WindowsCardSpace are surveyed and discussed to serve as a foundation for future work in this area.

Index Terms—RBA,Encryption/Decryption, Open ID, Windows Card -Space

1. Institute of Engineering & Sciences, IPS Academy, Indore
2.Institute of Computer Science, Vikram University, Ujjaindharmendrachoukse@gmail.com, Umeshsingh@rediffmail.com

[PDF]

Cite: Dharmendra Choukse and Umesh Kumar Singh, "Role Based Authentication Schemes for Security Automation," International Journal of Computer Theory and Engineering vol. 3, no. 1, pp. 58-63, 2011.


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.