REVIEW OF SOLUTIONS FOR IMPROVING AUTHENTICATION AND AUTHORIZATION PROCESSES ON WEB RESOURCES

Authors

DOI:

https://doi.org/10.30888/2663-5712.2024-25-00-022

Keywords:

network security risks, security threats, vulnerabilities, authentication and authorization processes.

Abstract

The paper examines the analysis of the key concepts of authentication and authorization on web resources, demonstrating their necessity and application on web platforms. Various methods and means of protection are analyzed, including login and password,

Metrics

Metrics Loading ...

References

De Soete M. Two-Factor Authentication. Encyclopedia of Cryptography and Security. Boston, MA, 2011. P. 1341.

Landrock P. Two-Factor Authentication. Encyclopedia of Cryptography and Security. P. 638.

Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Network sensors ISSN 1424-8220

Holmes S. Getting MEAN with Mongo, Express, Angular, and Node. Manning Publications, 2015. 440 p.

Audio Fingerprinting. An Introduction to Audio Content Analysis. Hoboken, NJ, USA, 2012. P. 163–167.

Biometrics: Personal Identification in Networked Society. Springer, 2005. 411 p.

Трояновська Т. І. Побудова захищених мереж на базі обладнання компанії Cisco. // Захарченко С.М., Трояновська Т. І., Бойко О.В. Навчальний посібник. Вінниця : ВНТУ, 2017. – 133 с.

Published

2024-05-30

How to Cite

Коробейнікова, Т., Непийвода, М., & Матвійчук, А. (2024). REVIEW OF SOLUTIONS FOR IMPROVING AUTHENTICATION AND AUTHORIZATION PROCESSES ON WEB RESOURCES. SWorldJournal, 1(25-01), 82–88. https://doi.org/10.30888/2663-5712.2024-25-00-022

Issue

Section

Articles