Skip to main content

Authentication

  • Chapter
  • First Online:
  • 3095 Accesses

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

Authentication is the process of validating the identity of someone or something. It uses information provided to the authenticator to determine whether someone or something is in fact who or what it is declared to be. In private and public computing systems, for example, in computer networks, the process of authentication commonly involves someone, usually the user, using a password provided by the system administrator to log-on. The user’s possession of a password is meant to guarantee that the user is authentic. It means that at some previous time, the user requested, from the system administrator, and the administrator assigned and/or registered a self-selected password.

This is a preview of subscription content, log in via an institution.

References

  1. Pipkin DL (2000) Information security: protecting the global enterprise. Prentice Hall, Upper Saddle River

    Google Scholar 

  2. Holden G (2004) Guide to firewalls and network security: intrusion detection and VPNs. Thomason Learning, Boston

    Google Scholar 

  3. The Rainbow Books (1983) National Computer Security Center. http://www.fas.org/irp/nsa/rainbow/tg017.htm

  4. Marshall B (2002) Consider your options for authentication. http://www.ins.com/downloads/publications/bMarshall_issa_password_article_062002.pdf

  5. Cryptography Research Group – Projects. http://www.research.ibm.com/security/projects html

  6. Galbraith S, Wenbo Mao (2003) Invisibility and anonymity of undeniable and consumer signatures. http://www-uk.hpl.hp.com/people/wm/papers/InAnRSA.pdf

  7. Glossary of terms. http://www.asuretee.com/developers/authentication-terms.shtm

  8. Kaeo M (1999) Designing network security: a practical guide to creating a secure network infrastructure. Cisco Press, Indianapolis

    Google Scholar 

  9. Digital Signature Authentication. http://www.cequrux.com/support/firewall/node29.htm

  10. Configuring SSL Authentication. Oracle advance security administrator’s guide release 8.1.5. A677–01 http://www.csee.umbc.edu/help/oracle8/network.815/a67766/09_ssl.htm

  11. Brian T (2005) The Moron’s guide to Kerberos http://www.isi.edu/~brian/security/kerberos html

  12. Barkley J (1994) Robust authentication procedures. http://csrc.nist.gov/publications/nistpubs/800–7/node166.html

  13. General information on Kerberos. http://www.cmf.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html#tgttgs

  14. Certificate Authentication. http://www.ssh.com/support/documentation/online/ssh/adminguide/32/Certificate_Authentication-2.html

  15. Brooke P (2011) Setting the stage for authentication network computing. http://www.networkcomputing.com/1211/1211ws22.html

  16. Ratha NK, Connell JH, Bolle RM (2001) Secure fingerprint-based authentication for lotus notes. http://www.research.ibm.com/ecvg/pubs/ratha-notes.pdf

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag London

About this chapter

Cite this chapter

Kizza, J.M. (2015). Authentication. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6654-2_10

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6653-5

  • Online ISBN: 978-1-4471-6654-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics