Introduction:
As information technologies evolved and became more important for business and home use, users demanded for ways of directly connecting to systems in different locations. From large internet service providers, operators of bulletin board systems, to businesses getting critical data to road warriors in a timely manner, remote system access and networks became critical services that administrators were required to provide. However, it was necessary to ensure that only authorized users could access the provider’s resources, they could only access the resources they needed, and the administrators could track the users’ activities and access time for purposes of ensuring ...