Advertisement

Authentication

  • Joseph Migga Kizza
Chapter
Part of the Computer Communications and Networks book series (CCN)

Abstract

Authentication is the process of validating the identity of someone or something. It uses information provided to the authenticator to determine whether someone or something is in fact who or what it is declared to be. In private and public computing systems, for example, in computer networks, the process of authentication commonly involves someone, usually the user, using a password provided by the system administrator to logon. The user’s possession of a password is meant to guarantee that the user is authentic. It means that at some previous time, the user requested, from the system administrator, and the administrator assigned and/or registered a self-selected password.

Keywords

Certificate Authority Authentication Process Extensible Authentication Protocol Access Control Mechanism Secure Socket Layer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Pipkin, Donald, L. Information Security: Protecting the Global Enterprise. Upper Saddle River, NJ: Prentice Hall, 2000.Google Scholar
  2. 2.
    Holden, Greg. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. Boston, MA: Thomason Learning, 2004.Google Scholar
  3. 3.
    The Rainbow Books, National Computer Security Center, http://www.fas.org/irp/nsa/rainbow/tg017.htm.
  4. 4.
    Marshall, Bruce. Consider Your Options for Authentication. http://www.ins.com/downloads/publications/bMarshall_issa_password_article_062002.pdf.
  5. 5.
    Cryptography Research Group – Projects. http://www.research.ibm.com/security/projects.html.
  6. 6.
    Galbraith, Steven, and Wenbo Mao. Invisibility and Anonymity of Undeniable and Consumer Signatures. http://www-uk.hpl.hp.com/people/wm/papers/InAnRSA.pdf.
  7. 7.
  8. 8.
    Kaeo, Merike. Designing Network Security: A Practical Guide to Creating a Secure Network Infrastructure. Indianapolis: Cisco Press, 1999.Google Scholar
  9. 9.
    Digital Signature Authentication. http://www.cequrux.com/support/firewall/node29.htm.
  10. 10.
    Configuring SSL Authentication. Oracle Advance Security Administrator’s Guide Release 8.1.5. A677–01 http://www.csee.umbc.edu/help/oracle8/network.815/a67766/09_ssl.htm.
  11. 11.
    Brian Tung. The Moron’s Guide to Kerberos. http://www.isi.edu/∼brian/security/kerberos.html.
  12. 12.
    Barkley, John. Robust Authentication Procedures. http://csrc.nist.gov/publications/nistpubs/800–7/node166.html.
  13. 13.
  14. 14.
  15. 15.
    Paul Brooke. Setting The Stage For Authentication Network Computing. http://www.networkcomputing.com/1211/1211ws22.html.

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringUniversity of Tennessee-ChattanoogaChattanoogaUSA

Personalised recommendations