Security integration to simplify user access
โ Scribed by Helen Meyer
- Publisher
- Elsevier Science
- Year
- 1998
- Tongue
- English
- Weight
- 89 KB
- Volume
- 17
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
IBM hedges its bets on SET, Sh~~ur~ Muchfis. IBM NetWare 5. The combination of industry-standard will work with CyberCash Inc. to incorporate Secure LI>AP v.3 integration and the port of Entrust/Alliance Sockets Layer (SSL) transactions into its IBM Payment PKI to NetWare will, claim the companies, simpli% Server, which already handles Secure Electronic network authentication for users, reduce redundancy Transaction (SET).The move by IBM could be seen in network administration and lower the total cost of as evidence that the uptake of SET is slower than ownership for secure networking applications. As part anticipated, with little interest amongst Internet mer-of the integration of NIX and NetWare with Entrust chants or consumers. IBM officials said that their deci-PKI, applications have the ability to securely store and sion wasn't a setback for SET, but simply a show of retrieve security information associated with a user's support for a current standard whilst retaining a authenticated NIX connection. Customers will have migration path to SET.Visa supports the use of SSL access to the single sign-on solution, allowing a single encryption until SET, its preferred standard, is in wider login to be shared across Entrust-Ready applications use.To use SET, merchants must have special software, to save time and increase user productivity.
Once the and each SET purchase requires multiple encrypted solution is in place, the user need only log into NIX transactions.
Consumers need digital certificates and because Novell's secret store encrypts and stores the special 'wallet' software to make a SET purchase, user authentication files so that the user need not supinstead of just a credit card number as for SSL. The ply it to the application again. In addition, because wallet in Microsoft's Internet Explorer 4.0. for exam-NIX is distributed rather than server-centric, Entrust ple, supports SET as well as SSL. Corrrpr~tcrzr~ovl~, _Ilr/y users gain the ability to log in from any location on 20, 1998, j7. 4. the network. ,'et~~~k Secwity, Arygrsl 2998.
๐ SIMILAR VOLUMES
User authentication is a major problem in gaining access rights for computer resources. A recent approach to enhance the computer access rights is the use of biometric properties as the keystroke rhythms of users. Therefore user authentication for computers can be more secure using keystroke rhythms