NotesFAQContact Us
Search Tips
PDF pending restoration PDF pending restoration
ERIC Number: ED140815
Record Type: Non-Journal
Publication Date: 1977-May
Pages: 60
Abstractor: N/A
Reference Count: N/A
The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology.
Wood, Helen M.
This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both in storage and transmission, is dealt with in the next section, followed by brief sections on current implementations and cost considerations. A glossary and an annotated bibliography of all referenced material are included. (Author)
Superintendent of Documents, U.S. Government Printing Office, Washington, D.C. 20402 (C13.10:500-9, Stock No. 003-003-01770-1, $2.00)
Publication Type: Reports - Research
Education Level: N/A
Audience: N/A
Language: N/A
Sponsor: N/A
Authoring Institution: National Bureau of Standards (DOC), Washington, DC. Inst. for Computer Sciences and Technology.