Abstract
Authentication is the process of validating the identity of someone or something. It uses information provided to the authenticator to determine whether someone or something is in fact who or what it is declared to be. In private and public computing systems, for example, in computer networks, the process of authentication commonly involves someone, usually the user, using a password provided by the system administrator to log-on. The user’s possession of a password is meant to guarantee that the user is authentic. It means that at some previous time, the user requested, from the system administrator, and the administrator assigned and/or registered a self-selected password.
This is a preview of subscription content, log in via an institution.
References
Pipkin DL (2000) Information security: protecting the global enterprise. Prentice Hall, Upper Saddle River
Holden G (2004) Guide to firewalls and network security: intrusion detection and VPNs. Thomason Learning, Boston
The Rainbow Books (1983) National Computer Security Center. http://www.fas.org/irp/nsa/rainbow/tg017.htm
Marshall B (2002) Consider your options for authentication. http://www.ins.com/downloads/publications/bMarshall_issa_password_article_062002.pdf
Cryptography Research Group – Projects. http://www.research.ibm.com/security/projects html
Galbraith S, Wenbo Mao (2003) Invisibility and anonymity of undeniable and consumer signatures. http://www-uk.hpl.hp.com/people/wm/papers/InAnRSA.pdf
Glossary of terms. http://www.asuretee.com/developers/authentication-terms.shtm
Kaeo M (1999) Designing network security: a practical guide to creating a secure network infrastructure. Cisco Press, Indianapolis
Digital Signature Authentication. http://www.cequrux.com/support/firewall/node29.htm
Configuring SSL Authentication. Oracle advance security administrator’s guide release 8.1.5. A677–01 http://www.csee.umbc.edu/help/oracle8/network.815/a67766/09_ssl.htm
Brian T (2005) The Moron’s guide to Kerberos http://www.isi.edu/~brian/security/kerberos html
Barkley J (1994) Robust authentication procedures. http://csrc.nist.gov/publications/nistpubs/800–7/node166.html
General information on Kerberos. http://www.cmf.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html#tgttgs
Certificate Authentication. http://www.ssh.com/support/documentation/online/ssh/adminguide/32/Certificate_Authentication-2.html
Brooke P (2011) Setting the stage for authentication network computing. http://www.networkcomputing.com/1211/1211ws22.html
Ratha NK, Connell JH, Bolle RM (2001) Secure fingerprint-based authentication for lotus notes. http://www.research.ibm.com/ecvg/pubs/ratha-notes.pdf
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag London
About this chapter
Cite this chapter
Kizza, J.M. (2015). Authentication. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_10
Download citation
DOI: https://doi.org/10.1007/978-1-4471-6654-2_10
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-6653-5
Online ISBN: 978-1-4471-6654-2
eBook Packages: Computer ScienceComputer Science (R0)