O'Reilly logo

Introduction to Computer Security by Matt Bishop

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Representing Identity

 

AEMELIA: Most mighty duke, behold a man much wrong'd. All gather to see them.ADRIANA: I see two husbands, or mine eyes deceive me!DUKE SOLINUS: One of these men is Genius to the other; And so of these, which is the natural man, And which the spirit? Who deciphers them?DROMIO OF SYRACUSE: I, sir, am Dromio: command him away.DROMIO OF EPHESUS: I, sir, am Dromio: pray, let me stay.

 
 -- The Comedy of Errors, V, i, 332–338.

The theme of identity runs throughout humanity's experience, and computers are no exception. In computer science, an identity is the basis for assignment of privileges and is integral in the designation of a protection domain. This chapter discusses the many different types of identity and the contexts ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required