Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

University of Tennessee, Knoxville

Authentication

Articles 1 - 1 of 1

Full-Text Articles in Computer Engineering

A Framework For Federated Two-Factor Authentication Enabling Cost-Effective Secure Access To Distributed Cyberinfrastructure, Matthew Allan Ezell May 2012

A Framework For Federated Two-Factor Authentication Enabling Cost-Effective Secure Access To Distributed Cyberinfrastructure, Matthew Allan Ezell

Masters Theses

As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity.

The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, …