ISSN : 2583-2646

Authentication and Authorization of Internal Applications in Software Companies

ESP Journal of Engineering & Technology Advancements
© 2021 by ESP JETA
Volume 1  Issue 1
Year of Publication : 2021
Authors : Saidaiah Yechuri
: 10.56472/25832646/JETA-V1I1P120

Citation:

Saidaiah Yechuri, 2021. "Climate Change and Insurance: Using Predictive Analytics to Navigate Emerging Risks", ESP Journal of Engineering & Technology Advancements 1(1): 195-199.

Abstract:

Authentication and authorization are crucial components in the security of internal applications within software. Internal applications in software companies play a crucial role in facilitating efficient operations, data management, and collaboration among employees. However, these applications often deal with sensitive information and require robust security measures to prevent unauthorized access and misuse. This paper explores the challenges and best practices in implementing effective authentication and authorization mechanisms for internal applications in software companies.

References:

[1] (CSD), N C S D. (n.d). The NIST Model for Role-Based Access Control: Toward A Unified Standard. https://csrc.nist.gov/CSRC/media/Publications/conference-paper/2000/07/26/the-nist-model-for-role-based-access-control-towards-a-unified-/documents/sandhu-ferraiolo-kuhn-00.pdf

[2] Carl, A., & Alexandros, D. (2008, April 1). A Two-Phase Authentication Protocol Using the Cell Phone as a Token. Taylor & Francis, 4(2), 23-39. https://doi.org/10.1080/2333696x.2008.10855838

[3] CISA. (2022, January 3). Multi-Factor Authentication Fact Sheet. https://www.cisa.gov/sites/default/files/publications/MFA-Fact-Sheet-Jan22-508.pdf

[4] Data Security Best Practices. White Paper - PDF Free Download. (2023, February 7). https://docplayer.net/7040828-Data-security-best-practices-white-paper.html

[5] Davis, R. (2023, November 9). Network authentication tokens. https://ieeexplore.ieee.org/document/81056/

[6] Giacinto@diee.unica.it, D F S J L C S M D B B R B B G G U D C. (2016, November 4). Who Are You? A Statistical Approach to Measuring User Authenticity. https://www.ndss-symposium.org/wp-content/uploads/2017/09/who-are-you-statistical-approach-measuring-user-authenticity.pdf

[7] Kuhn, D R., Coyne, E J., & Weil, T. (2010, June 1). Adding Attributes to Role-Based Access Control. IEEE Computer Society, 43(6), 79-81. https://doi.org/10.1109/mc.2010.155

[8] Microsoft Password Guidance. (2023, January 8). https://www.microsoft.com/en-us/research/wp-content/uploads/2016/06/Microsoft_Password_Guidance-1.pdf

Keywords:

Software Companies, Crucial Role, Authentication, Authorization.