Skip to Main Content
Computer Security Art and Science, 2nd Edition
book

Computer Security Art and Science, 2nd Edition

by Matt Bishop
November 2018
Intermediate to advanced content levelIntermediate to advanced
1440 pages
48h 29m
English
Addison-Wesley Professional
Content preview from Computer Security Art and Science, 2nd Edition

Chapter 15

Representing Identity

AEMELIA: Most mighty duke, behold a man much wrong’d.

All gather to see them.

ADRIANA: I see two husbands, or mine eyes deceive me!

DUKE SOLINUS: One of these men is Genius to the other;

And so of these, which is the natural man,

And which the spirit? Who deciphers them?

DROMIO OF SYRACUSE: I, sir, am Dromio: command him away.

DROMIO OF EPHESUS: I, sir, am Dromio: pray, let me stay.

The Comedy of Errors, V, i, 332–338.

The theme of identity runs throughout humanity’s experience, and computers are no exception. In computer science, an identity is the basis for assignment of privileges and is integral in the designation of a protection domain. This chapter discusses the many different types of identity and the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Engineering, 3rd Edition

Security Engineering, 3rd Edition

Ross Anderson
Defensive Security Handbook, 2nd Edition

Defensive Security Handbook, 2nd Edition

Lee Brotherston, Amanda Berlin, William F. Reyor

Publisher Resources

ISBN: 9780134097145