Skip to Main Content
Computer Security Art and Science, 2nd Edition
book

Computer Security Art and Science, 2nd Edition

by Matt Bishop
November 2018
Intermediate to advanced content levelIntermediate to advanced
1440 pages
48h 29m
English
Addison-Wesley Professional
Content preview from Computer Security Art and Science, 2nd Edition

Chapter 13

Authentication

ANTIPHOLUS OF SYRACUSE: To me she speaks; she moves me for her theme!

What, was I married to her in my dream?

Or sleep I now and think I hear all this?

What error drives our eyes and ears amiss?

Until I know this sure uncertainty, I’ll entertain the offer’d fallacy

The Comedy of Errors, II, ii, 185–190.

Authentication is the binding of an identity to a principal. Network-based authentication mechanisms require a principal to authenticate to a single system, either local or remote. The authentication is then propagated. This chapter explores the question of authentication to a single system.

13.1 Authentication Basics

Subjects act on behalf of some other, external entity. The identity of that entity controls the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Engineering, 3rd Edition

Security Engineering, 3rd Edition

Ross Anderson
Defensive Security Handbook, 2nd Edition

Defensive Security Handbook, 2nd Edition

Lee Brotherston, Amanda Berlin, William F. Reyor

Publisher Resources

ISBN: 9780134097145