Skip to main content

Authentication

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

  • 192k Accesses

Abstract

Authentication is the process of validating the identity of someone or something. It uses information provided to the authenticator to determine whether someone or something is in fact who or what it is declared to be. In private and public computing systems, for example, in computer networks, the process of authentication commonly involves someone, usually the user, using a password provided by the system administrator to logon. The user’s possession of a password is meant to guarantee that the user is authentic. It means that at some previous time, the user requested, from the system administrator, and the administrator assigned and/or registered a self-selected password.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pipkin DL (2000) Information security: protecting the global enterprise. Prentice Hall, Upper Saddle River

    Google Scholar 

  2. Holden G (2004) Guide to firewalls and network security: intrusion detection and VPNs. Thomason Learning, Boston

    Google Scholar 

  3. The Rainbow Books. National Computer Security Center, http://fas.org/irp/nsa/rainbow.htm

  4. Marshall B. Consider your options for authentication. http://www.passwordresearch.com/files/TipsforAvoidingBadQuestions.pdf

  5. Cryptography Research Group – Projects. http://www.research.ibm.com/security/projects.html

  6. Galbraith S, Mao W Invisibility and anonymity of undeniable and consumer signatures. http://www-uk.hpl.hp.com/people/wm/papers/InAnRSA.pdf

  7. Glossary of Terms. http://www.asuretee.com/developers/authentication-terms.shtm

  8. Kaeo M (1999) Designing network security: a practical guide to creating a secure network infrastructure. Cisco Press, Indianapolis

    Google Scholar 

  9. Digital Signature Authentication. https://www.google.com/patents/US20080222049

  10. Configuring SSL Authentication. Oracle advance security administrator’s guide release 8.1.5. A677–01. http://www.csee.umbc.edu/help/oracle8/network.815/a67766/09_ssl.htm

  11. Tung B. The Moron’s Guide to Kerberos. http://www.isi.edu/~brian/security/kerberos.html

  12. Barkley J. Robust authentication procedures. http://csrc.nist.gov/publications/nistpubs/800–7/node166.html

  13. General Information on Kerberos. http://www.cmf.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html#tgttgs

  14. Winkelmeyer R. Explaining Certificate Authentication – 101 Style July 14. https://blog.winkelmeyer.com/2014/07/explaining-certificate-authentication-101-style/

  15. Brooke P. Setting the stage for authentication network computing. http://www.networkcomputing.com/1211/1211ws22.html

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Kizza, J.M. (2017). Authentication. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-55606-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-55606-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-55605-5

  • Online ISBN: 978-3-319-55606-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics