
An analysis of containment, surveillance, and authentication for software
Author(s) -
W.J. Hunteman
Publication year - 1995
Language(s) - English
Resource type - Reports
DOI - 10.2172/115633
Subject(s) - authentication (law) , software , computer science , computer security , operating system
The {open_quotes}Protection, Containment, Surveillance, and Authentication (PCSA){close_quotes} software was evaluated. The purpose of the evaluation was to determine the effectiveness of PCSA software in meeting the goals of a cost-effective, non-intrusive method for software authentication. Conclusions from the evaluation include (1) Commercially available software should be evaluated for the ability to provide the necessary control of access to and use of a PC. (2) The proposed software authentication methodology is not a cost-effective solution for the Agency and should be abandoned