Abstract
Authentication is the process of validating the identity of someone or something. It uses information provided to the authenticator to determine whether someone or something is in fact who or what it is declared to be. In private and public computing systems, for example, in computer networks, the process of authentication commonly involves someone, usually the user, using a password provided by the system administrator to logon. The user’s possession of a password is meant to guarantee that the user is authentic. It means that at some previous time, the user requested, from the system administrator, and the administrator assigned and/or registered a self-selected password.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pipkin DL (2000) Information security: protecting the global enterprise. Prentice Hall, Upper Saddle River
Holden G (2004) Guide to firewalls and network security: intrusion detection and VPNs. Thomason Learning, Boston
The Rainbow Books. National Computer Security Center, http://fas.org/irp/nsa/rainbow.htm
Marshall B. Consider your options for authentication. http://www.passwordresearch.com/files/TipsforAvoidingBadQuestions.pdf
Cryptography Research Group – Projects. http://www.research.ibm.com/security/projects.html
Galbraith S, Mao W Invisibility and anonymity of undeniable and consumer signatures. http://www-uk.hpl.hp.com/people/wm/papers/InAnRSA.pdf
Glossary of Terms. http://www.asuretee.com/developers/authentication-terms.shtm
Kaeo M (1999) Designing network security: a practical guide to creating a secure network infrastructure. Cisco Press, Indianapolis
Digital Signature Authentication. https://www.google.com/patents/US20080222049
Configuring SSL Authentication. Oracle advance security administrator’s guide release 8.1.5. A677–01. http://www.csee.umbc.edu/help/oracle8/network.815/a67766/09_ssl.htm
Tung B. The Moron’s Guide to Kerberos. http://www.isi.edu/~brian/security/kerberos.html
Barkley J. Robust authentication procedures. http://csrc.nist.gov/publications/nistpubs/800–7/node166.html
General Information on Kerberos. http://www.cmf.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html#tgttgs
Winkelmeyer R. Explaining Certificate Authentication – 101 Style July 14. https://blog.winkelmeyer.com/2014/07/explaining-certificate-authentication-101-style/
Brooke P. Setting the stage for authentication network computing. http://www.networkcomputing.com/1211/1211ws22.html
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Kizza, J.M. (2017). Authentication. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-55606-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-55606-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-55605-5
Online ISBN: 978-3-319-55606-2
eBook Packages: Computer ScienceComputer Science (R0)