Komarova et al., 2018

Comparison of Authentication Methods on Web Resources

article

Authors

Komarova, A., Menshchikov, A., Negols, A., Korobeynikov, A., Gatchin, Y., Tishukova, N.

Identifiers

  • DOI: 10.1007/978-3-319-68321-8_11

Publication

Proceedings of the Second International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’17), pages 104–113

Year

2018

Abstract

These days web resources keep and process a lot of valuable information. Confidential data and private pages have to be protected due to business processes. To implement this requirement and limit the number of people having access to the restricted resources, you need to configure a proper authentication on website. Unfortunately authentication is often implemented incorrectly which leads to information leaks. Frequently websites have only password protection and use other simple methods. The article deals with different comparison of authentication methods, using both simple and advanced approaches including cryptography and biometrics. Moreover, the authors give the comparative analysis of different approach parameters. Usability, performance, security and other features of the methods are analyzed. The most convenient to use, the easiest to implement and the most secure methods are found. A conclusion about the most suitable application areas of each method on World Wide Web resource is made. Possible combinations of approaches and their further implementation tendency are also discussed. An analysis of domestic and foreign literary sources, scientific articles and publications on our topic is made for the finding verification. We perform Russian and international literature search on the scientific databases as well as on the electronic library systems. Furthermore, patent research is made for finding practical implementations. It includes patents of the business organizations related to web authentication methods. The results of this research show the topic relevance, the increasing number of patented authentication methods on web resources, as well as a fairly high potential of the new method development. This way should base on improvement and unification of existing approaches and on developing of new original algorithms. As a result, it is concluded that further improvements in the trends are in the field of hybrid systems.

(Komarova et al., 2018, p. 1)

Links

Citation

Komarova, A., Menshchikov, A., Negols, A., Korobeynikov, A., Gatchin, Y., Tishukova, N., 2018. Comparison of Authentication Methods on Web Resources, in: Abraham, A., Kovalev, S., Tarassov, V., Snasel, V., Vasileva, M., Sukhanov, A. (Eds.), Proceedings of the Second International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’17), Advances in Intelligent Systems and Computing. Springer International Publishing, Cham, pp. 104–113. https://doi.org/10.1007/978-3-319-68321-8_11


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.