• Mar 27, 2019 News!Vol.11, No.2 has been published with online version.   [Click]
  • Aug 06, 2018 News!Vol.9, No.1-Vol.9, No.4 have been indexed by EI (Inspec).   [Click]
  • Mar 27, 2019 News!Vol.9, No.1-Vol. 10, No. 6 have been indexed by Crossref.
General Information
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2011 Vol.3(1): 58-63 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2011.V3.283

Role Based Authentication Schemes for Security Automation

Dharmendra Choukse and Umesh Kumar Singh

Abstract—Academy Automation implies to the various different computing hardware and software that can be used to digitally create, manipulate, collect, store, and relay Academy information needed for accomplishing basic Operation like admissions and registration to finance, student and faculty interaction, online library, medical and business development. Raw data storage, electronic transfer, and the management of electronic business information comprise the basic activities of an Academy automation system. The main aim of this work was to design and implement a Role Based Authentication (RBA) System wherein each user has certain roles allotted to him/her which defines the user’s limits and capabilities of making changes, accessing various areas of the software and transferring/allotting these roles recursively. Strict security measures had kept in mind while designing such a system and proper encryption and decryption techniques are used at both ends to prevent any possibility of any third party attacks. Further, various new age authentication techniques like Open ID and WindowsCardSpace are surveyed and discussed to serve as a foundation for future work in this area.

Index Terms—RBA,Encryption/Decryption, Open ID, Windows Card -Space

1. Institute of Engineering & Sciences, IPS Academy, Indore
2.Institute of Computer Science, Vikram University, Ujjaindharmendrachoukse@gmail.com, Umeshsingh@rediffmail.com


Cite: Dharmendra Choukse and Umesh Kumar Singh, "Role Based Authentication Schemes for Security Automation," International Journal of Computer Theory and Engineering vol. 3, no. 1, pp. 58-63, 2011.

Copyright © 2008-2019. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@iacsitp.com