Authentication - High-Impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors (Electronic book text)


One familiar use of authentication and authorization is access control. A computer system that is supposed to be used only by those authorized must attempt to detect and exclude the unauthorized. Access to it is therefore usually controlled by insisting on an authentication procedure to establish with some degree of confidence the identity of the user, granting privileges established for that identity.

This book is your ultimate resource for Authentication. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Authentication right away, covering: Authentication, Access control list, Access Control Matrix, Atomic authorization, Authorization, Bell-LaPadula model, Closed-loop authentication, Comparison of privilege authorization features, Computational trust, Context-based access control, Copy protection, Cryptographic log on, DACL, Database audit, DataLock Technology, Delegated administration, Delegation of Control, Digipass, Digital identity, Directory service, Discretionary access control, Distributed Access Control System, Draw a Secret, EAuthentication, Federated identity, Federated identity management, Form-based authentication, Global Trust Council, HERAS-AF, HTTP cookie, HTTP+HTML form-based authentication, IBM Lightweight Third-Party Authentication, IBM Tivoli Access Manager, Identity Assertion Provider, Identity driven networking, Initiative For Open Authentication, Integrated Windows Authentication, Internet Authentication Service, Java Authentication and Authorization Service, Location-based authentication, Logical access control, Login, LOMAC, Mandatory access control, MicroID, Microsoft Fingerprint Reader, Mobilegov, Multi-factor authentication, Mutual authentication, NemID, NIST RBAC model, OAuth, Object-capability model, One-time authorization code, One-time password, Organisation-based access control, PassWindow, Pre-boot authentication, Registered user, Restricting Access to Databases, Richacls, Risk-based authentication, Role hierarchy, Rootkit, Salute picture, Secure attention key, Security Assertion Markup Language, Security question, Security store, Security token, Single sign-on, SiteKey, Software token, Spring Security, Strong authentication, Subscriber Identity Module, Syncope (software), Time-based One-time Password Algorithm, Transaction authentication, Transaction authentication number, Tripcode, TUPAS, Two-factor authentication, Universal controls, Vidoop, Voms, Wilmagate, Windows credentials.

This book explains in-depth the real drivers and workings of Authentication. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Authentication with the objectivity of experienced professionals.


Delivery AdviceNot available

Toggle WishListAdd to wish list
Review this Item

Product Description

One familiar use of authentication and authorization is access control. A computer system that is supposed to be used only by those authorized must attempt to detect and exclude the unauthorized. Access to it is therefore usually controlled by insisting on an authentication procedure to establish with some degree of confidence the identity of the user, granting privileges established for that identity.

This book is your ultimate resource for Authentication. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Authentication right away, covering: Authentication, Access control list, Access Control Matrix, Atomic authorization, Authorization, Bell-LaPadula model, Closed-loop authentication, Comparison of privilege authorization features, Computational trust, Context-based access control, Copy protection, Cryptographic log on, DACL, Database audit, DataLock Technology, Delegated administration, Delegation of Control, Digipass, Digital identity, Directory service, Discretionary access control, Distributed Access Control System, Draw a Secret, EAuthentication, Federated identity, Federated identity management, Form-based authentication, Global Trust Council, HERAS-AF, HTTP cookie, HTTP+HTML form-based authentication, IBM Lightweight Third-Party Authentication, IBM Tivoli Access Manager, Identity Assertion Provider, Identity driven networking, Initiative For Open Authentication, Integrated Windows Authentication, Internet Authentication Service, Java Authentication and Authorization Service, Location-based authentication, Logical access control, Login, LOMAC, Mandatory access control, MicroID, Microsoft Fingerprint Reader, Mobilegov, Multi-factor authentication, Mutual authentication, NemID, NIST RBAC model, OAuth, Object-capability model, One-time authorization code, One-time password, Organisation-based access control, PassWindow, Pre-boot authentication, Registered user, Restricting Access to Databases, Richacls, Risk-based authentication, Role hierarchy, Rootkit, Salute picture, Secure attention key, Security Assertion Markup Language, Security question, Security store, Security token, Single sign-on, SiteKey, Software token, Spring Security, Strong authentication, Subscriber Identity Module, Syncope (software), Time-based One-time Password Algorithm, Transaction authentication, Transaction authentication number, Tripcode, TUPAS, Two-factor authentication, Universal controls, Vidoop, Voms, Wilmagate, Windows credentials.

This book explains in-depth the real drivers and workings of Authentication. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Authentication with the objectivity of experienced professionals.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Tebbo

Country of origin

Australia

Release date

June 2011

Availability

We don't currently have any sources for this product. If you add this item to your wish list we will let you know when it becomes available.

Authors

Format

Electronic book text - Windows

Pages

206

ISBN-13

978-1-74304-653-1

Barcode

9781743046531

Categories

LSN

1-74304-653-7



Trending On Loot