• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Nov 09, 2017 News!Vol.9, No.5 has been published with online version. 16 peer reviewed articles from 11 specific areas are published in this issue.   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2011 Vol.3(1): 58-63 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2011.V3.283

Role Based Authentication Schemes for Security Automation

Dharmendra Choukse and Umesh Kumar Singh

Abstract—Academy Automation implies to the various different computing hardware and software that can be used to digitally create, manipulate, collect, store, and relay Academy information needed for accomplishing basic Operation like admissions and registration to finance, student and faculty interaction, online library, medical and business development. Raw data storage, electronic transfer, and the management of electronic business information comprise the basic activities of an Academy automation system. The main aim of this work was to design and implement a Role Based Authentication (RBA) System wherein each user has certain roles allotted to him/her which defines the user’s limits and capabilities of making changes, accessing various areas of the software and transferring/allotting these roles recursively. Strict security measures had kept in mind while designing such a system and proper encryption and decryption techniques are used at both ends to prevent any possibility of any third party attacks. Further, various new age authentication techniques like Open ID and WindowsCardSpace are surveyed and discussed to serve as a foundation for future work in this area.

Index Terms—RBA,Encryption/Decryption, Open ID, Windows Card -Space

1. Institute of Engineering & Sciences, IPS Academy, Indore
2.Institute of Computer Science, Vikram University, Ujjaindharmendrachoukse@gmail.com, Umeshsingh@rediffmail.com

[PDF]

Cite: Dharmendra Choukse and Umesh Kumar Singh, "Role Based Authentication Schemes for Security Automation," International Journal of Computer Theory and Engineering vol. 3, no. 1, pp. 58-63, 2011.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com