Authentication is the process of validating the identity of someone or something. It uses information provided to the authenticator to determine whether someone or something is in fact who or what it is declared to be. In private and public computing systems, for example, in computer networks, the process of authentication commonly involves someone, usually the user, using a password provided by the system administrator to logon. The user’s possession of a password is meant to guarantee that the user is authentic. It means that at some previous time, the user requested, from the system administrator, and the administrator assigned and/or registered a self-selected password.
KeywordsTransportation Expense Dial
- 1.Pipkin, Donald, L. Information Security: Protecting the Global Enterprise. Upper Saddle River, NJ: Prentice Hall, 2000.Google Scholar
- 2.Holden, Greg. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. Boston, MA: Thomason Learning, 2004.Google Scholar
- 3.The Rainbow Books, National Computer Security Center, http://www.fas.org/irp/nsa/rainbow/tg017.htm.
- 4.Marshall, Bruce. Consider Your Options for Authentication. http://www.ins.com/downloads/publications/bMarshall_issa_password_article_062002.pdf.
- 5.Cryptography Research Group – Projects. http://www.research.ibm.com/security/projects.html.
- 6.Galbraith, Steven, and Wenbo Mao. Invisibility and Anonymity of Undeniable and Consumer Signatures. http://www-uk.hpl.hp.com/people/wm/papers/InAnRSA.pdf.
- 7.Glossary of terms. http://www.asuretee.com/developers/authentication-terms.shtm
- 8.Kaeo, Merike. Designing Network Security: A Practical Guide to Creating a Secure Network Infrastructure. Indianapolis: Cisco Press, 1999.Google Scholar
- 9.Digital Signature Authentication. http://www.cequrux.com/support/firewall/node29.htm.
- 10.Configuring SSL Authentication. Oracle Advance Security Administrator’s Guide Release 8.1.5. A677–01 http://www.csee.umbc.edu/help/oracle8/network.815/a67766/09_ssl.htm.
- 11.Brian Tung. The Moron’s Guide to Kerberos. http://www.isi.edu/∼brian/security/kerberos.html.
- 12.Barkley, John. Robust Authentication Procedures. http://csrc.nist.gov/publications/nistpubs/800–7/node166.html.
- 13.General Information on Kerberos.http://www.cmf.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html#tgttgs.
- 14.Certificate Authentication. http://www.ssh.com/support/documentation/online/ssh/adminguide/32/Certificate_Authentication-2.html.
- 15.Paul Brooke. Setting The Stage For Authentication Network Computing. http://www.networkcomputing.com/1211/1211ws22.html.