Authentication

Chapter
Part of the Computer Communications and Networks book series (CCN)

Abstract

Authentication is the process of validating the identity of someone or something. It uses information provided to the authenticator to determine whether someone or something is in fact who or what it is declared to be. In private and public computing systems, for example, in computer networks, the process of authentication commonly involves someone, usually the user, using a password provided by the system administrator to logon. The user’s possession of a password is meant to guarantee that the user is authentic. It means that at some previous time, the user requested, from the system administrator, and the administrator assigned and/or registered a self-selected password.

Keywords

Transportation Expense Dial 

References

  1. 1.
    Pipkin, Donald, L. Information Security: Protecting the Global Enterprise. Upper Saddle River, NJ: Prentice Hall, 2000.Google Scholar
  2. 2.
    Holden, Greg. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. Boston, MA: Thomason Learning, 2004.Google Scholar
  3. 3.
    The Rainbow Books, National Computer Security Center, http://www.fas.org/irp/nsa/rainbow/tg017.htm.
  4. 4.
    Marshall, Bruce. Consider Your Options for Authentication. http://www.ins.com/downloads/publications/bMarshall_issa_password_article_062002.pdf.
  5. 5.
    Cryptography Research Group – Projects. http://www.research.ibm.com/security/projects.html.
  6. 6.
    Galbraith, Steven, and Wenbo Mao. Invisibility and Anonymity of Undeniable and Consumer Signatures. http://www-uk.hpl.hp.com/people/wm/papers/InAnRSA.pdf.
  7. 7.
  8. 8.
    Kaeo, Merike. Designing Network Security: A Practical Guide to Creating a Secure Network Infrastructure. Indianapolis: Cisco Press, 1999.Google Scholar
  9. 9.
    Digital Signature Authentication. http://www.cequrux.com/support/firewall/node29.htm.
  10. 10.
    Configuring SSL Authentication. Oracle Advance Security Administrator’s Guide Release 8.1.5. A677–01 http://www.csee.umbc.edu/help/oracle8/network.815/a67766/09_ssl.htm.
  11. 11.
    Brian Tung. The Moron’s Guide to Kerberos. http://www.isi.edu/∼brian/security/kerberos.html.
  12. 12.
    Barkley, John. Robust Authentication Procedures. http://csrc.nist.gov/publications/nistpubs/800–7/node166.html.
  13. 13.
  14. 14.
  15. 15.
    Paul Brooke. Setting The Stage For Authentication Network Computing. http://www.networkcomputing.com/1211/1211ws22.html.

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringUniversity of Tennessee-ChattanoogaChattanoogaUSA

Personalised recommendations