August 2018
Intermediate to advanced
512 pages
17h 18m
English
• 11.1 Entity Identification: Phase 1 of Authentication
• 11.2 Identity Certification: Phase 2 of Authentication
• 11.3 Identity Resolution: Phase 3 of Authentication
• 11.4 Identity Assertion and Identity Proving: Phases 4 and 5 of Authentication
• 11.5 Identity Decertification: Phase 6 of Authentication
• 11.6 Machine-to-Machine Authentication Chaining
• Explain the authentication problem and how cryptography is applied to solve it.
• Discuss the phases of authentication and how they relate to one another.
• List and describe the three types of unique identifying schemas.
• Compare and contrast strengths and weaknesses of identity schemas.
• Explain the value of ...