O'Reilly logo

Introduction to Computer Security by Matt Bishop

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Authentication

 

ANTIPHOLUS OF SYRACUSE: To me she speaks; she moves me for her theme! What, was I married to her in my dream? Or sleep I now and think I hear all this? What error drives our eyes and ears amiss? Until I know this sure uncertainty, I'll entertain the offer'd fallacy

 
 --The Comedy of Errors, II, ii, 185–190.

Authentication is the binding of an identity to a principal. Network-based authentication mechanisms require a principal to authenticate to a single system, either local or remote. The authentication is then propagated. This chapter explores the question of authentication to a single system.

Authentication Basics

Subjects act on behalf of some other, external entity. The identity of that entity controls the actions that ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required