Skip to main content

Authentication

  • Chapter
  • 1850 Accesses

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

9.7 References

  1. Pipkin, Donald, L. Information Security: Protecting the Global Enterprise. Upper Saddle River, NJ: Prentice Hall, 2000.

    Google Scholar 

  2. “The Rainbow Books,” National Computer Security Center, http://www.fas.org/irp/nsa/rainbow/tg017.htm

    Google Scholar 

  3. Marshall, Bruce. “Consider Your Options for Authentication”. http://www.ins.com/downloads/publications/bMarshall_issa_password_article_062002.pdf

    Google Scholar 

  4. “Cryptography Research Group —-Projects.” http://www.research.ibm.com/security/projects.html

    Google Scholar 

  5. “Glossary of terms.” http://www.asuretee.com/developers/authentication-terms.shtm

    Google Scholar 

  6. “Digital Signature Authentication.” http://www.cequrux.com/support/firewall/node29.htm

    Google Scholar 

  7. Kaeo, Merike. Designing Network Security: A Practical Guide to Creating a Secure Network Infrastructure. Indianapolis: Cisco Press, 1999.

    Google Scholar 

  8. “Certificate Authentication.” http://www.ssh.com/support/documentation/online/ssh/adminguide/32/Certificate_Authentication-2.html

    Google Scholar 

  9. “Configuring SSL Authentication.” Oracle Advance Security Administrator's Guide Release 8.1.5. A677-01 http://www.csee.umbc.edu/help/oracle8/network.815/a67766/09_ssl.htm

    Google Scholar 

  10. Barkley, John. “Robust Authentication Procedures.”. http://csrc.nist.gov/publications/nistpubs/800-7/nodel66.html

    Google Scholar 

  11. “General Information on Kerberos.” http://www.cmf.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html#tgttgs

    Google Scholar 

  12. Brian Tung. “The Moron's Guide to Kerberos.”. http://www.isi.edu/~brian/security/kerberos.html.

    Google Scholar 

  13. “AIX Version 4.3 Communications Programming Concepts: RPC Authentications.” http://www.nscp.upenn.edu/aix4.3html/aixprggd/progcomc/rpc_auth.htm.

    Google Scholar 

  14. Paul Brooke. “Setting The Stage For Authentication” Network Computing.” http://www.networkcomputing.com/1211/1211ws22.html).

    Google Scholar 

  15. Holden, Greg. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. Boston, MA: Thomason Learning, 2004.

    Google Scholar 

  16. Galbraith, Steven, and Wenbo Mao. “Invisibility and Anonymity of Undeniable and Confirmer Signatures.” http://www-uk.hpl.hp.com/people/wm/papers/InAnRSA.pdf

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

(2005). Authentication. In: Computer Network Security. Springer, Boston, MA. https://doi.org/10.1007/0-387-25228-2_9

Download citation

  • DOI: https://doi.org/10.1007/0-387-25228-2_9

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-20473-4

  • Online ISBN: 978-0-387-25228-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics