Outline the design of an authentication scheme

Assignment Help Basic Computer Science
Reference no: EM131229091

Outline the design of an authentication scheme that 'learns.' The authentication scheme would start with certain primitive information about a user, such as name and password. As the use of the computing system continued, the authentication system would gather such information as commonly used programming languages: dates, times, and lengths of computing session, and use of distinctive resources. The authentication challenges would become more individualized as the system learned more information about the user.

  • Your design should include a list of many pieces of information about a user that the system could collect. It is permissible for the system to ask an authenticated user for certain additional information, such as a favorite book, to use in subsequent challenges.
  • Your design should also consider the problem of presenting and validating these challenges. Does the would-be user answer a true-false or a multiple-choice question? Does the system interpret natural language prose?

Reference no: EM131229091

Questions Cloud

What is the return on investment for that scenario : What is the maximum acceptable cost to initiate the program to reach the break-even point within three years? What is the return on investment for that scenario?
Organizational theory-bureaucratic model-systems theory : The Great Escape illustrated a concept through either organizational theory, bureaucratic model, systems theory, human relations models, organizational culture, scientific management, and informal organizations. Pick one and give examples.
Identify how to maintain computer equipment : 1. Identify at least 3 types of computers, how they process information, and the purpose and function of key hardware components. 2. Identify how to maintain computer equipment and solve common problems relating to computer hardware.
Define describe discuss triangle thing type : Define, describe,discuss information, DIKW, value, measurement of DIKW. Define describe discuss IPO. Define describe discuss Triangle Thing(EPR) types of information system.
Outline the design of an authentication scheme : Outline the design of an authentication scheme that 'learns.' The authentication scheme would start with certain primitive information about a user, such as name and password.
Conduct vertical and horizontal analysis : Conduct vertical and horizontal analysis. Calculate financial ratio for the firm. Find the industry average of the financial ration and compare with your findings.
Purchase of five items with price of each items : How to get the total purchase of five items with price of each items and then displays the subtotal of the sale, the amount of sales tax, and the total. Assume the sales tax is 6 percent.
Drive the antenna with a sinusoidal source : Model a half-wave dipole, similar to Figure 4.9, by making five grid cells perfect conductors above and below the source point. Drive the antenna with a sinusoidal source at the appropriate frequency
Display on a local retail store website : Consider a program to display on a local retail store's website that includes the city's current time and temperature. In your opinion, who might want to attack the program? What types of harm might they want to cause? What kind of vulnerabilities..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd