Open sesame

Schley, Stewart
September 2009
CED;Sep2009, Vol. 35 Issue 9, p14
Trade Publication
The article focuses on the concept and creation of a computer user password. It states that Fernando Corbató, a former Massachusetts Institute of Technology (MIT) professor, created the concept of user password to protect private information. It notes that Corbató was the first computer expert who connects a password to a computer data.


Related Articles

  • MIT's LCS: A Whiff of `Oxygen.' Grochow, Jerrold // PC Week;05/10/99, Vol. 16 Issue 19, p82 

    Applauds the Laboratory for Computer Science (LCS) at the Massachusetts Institute of Technology, Cambridge. The 35-year history of the laboratory, which was originally called Project MAC; The role of Fernando Corbato in the development of time-sharing operating systems; Ron Rivest and the RSA...

  • Way better than nothing. Dingle, Simon // Finweek;10/17/2013, p24 

    The article evaluates password manager Dashlane.

  • Password Security Is a Must for Any Organization. Berger, Marshall A. // Computers in Libraries;May2003, Vol. 23 Issue 5, p41 

    Discusses the use of computer password to protect computer data. Importance of using computer password; Factors to consider when selecting a password; Use of passwords in library computers.

  • Field guide to passwords.  // Consumer Reports;Jul2014, Vol. 79 Issue 7, p19 

    The article offers information on creating computer passwords that are complex enough to protect information but easy for the user to remember. Topics include warnings against simple number sequences or words as passwords as well as against using one's name and birthday, the disadvantages of...

  • To manage all my PINs and passwords. Bekiaris, Maria // Money (Australia Edition);Sep2014, Issue 171, p42 

    The article focuses on the management of personal identification numbers (PIN) and passwords for personal and banking accounts. Topics covered include how to choose strong passwords and PIN that cannot easily be hacked or guessed, the benefits of using password managers to easily remember...

  • Password Secrets. Gilman, Rick // American Agent & Broker;Jan2012, Vol. 84 Issue 1, p18 

    The article presents information related to the worldwide use of passwords to secure information. It is stated that the first step to gaining entrance to everything from programs to systems is usernames and passwords. It is noted that ensuring security into the workflow is the second issue. It...

  • Practicing safe security: Responsible password behavior. Webb, Michael // On Balance;Sep2012, Vol. 8 Issue 5, p32 

    The article discusses the need for people to establish good password behavior to keep their data secure. By applying guidelines on how to handle passwords, people develop their own custom password policy, and arm themselves against intruders. Details on how to create a password policy are...

  • Passwords aren't dead but they need fixing. Greene, Tim // Network World;1/9/2012, Vol. 29 Issue 1, p8 

    The article discusses security issues concerning enterprise passwords in the U.S. Cormac Herley, a principal researcher at Microsoft Research, stresses that password use needs an upgrade that is driven by actually understanding the real damage that can be made when password security is...

  • A Secure SCAM (Smart Card based Authentication Mechanism). Pippal, Ravi Singh; Ahirwar, Rajesh; Kushwah, Shivpratap Singh; Yadav, Pradeep // International Journal of Computer Applications;Jun2013, Vol. 72 Issue 1-23, p26 

    Recently, Tsai et al. proposed dynamic ID based smart card authentication scheme. This paper demonstrates that Tsai et al.'s scheme fails to provide early wrong password detection, secure password change and protection against insider attack. To overcome, we propose a secure SCAM (Smart Card...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics