Abstract
Identification is usually one of the first safeguards that is used to protect computer resources against an unauthorized access. Any access control that governs how the computer resources are accessed and by whom assumes that there is an identification mechanism that works reliably.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Pieprzyk, J., Hardjono, T., Seberry, J. (2003). Identification. In: Fundamentals of Computer Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-07324-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-662-07324-7_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-07713-5
Online ISBN: 978-3-662-07324-7
eBook Packages: Springer Book Archive