Authentication and Authorization

Authored by: David Millman

Encyclopedia of Library and Information Science, Fourth Edition

Print publication date:  November  2017
Online publication date:  November  2017

Print ISBN: 9781466552593
eBook ISBN: 9781315116143
Adobe ISBN:

10.1081/E-ELIS4-120008659

 Download Chapter

 

Abstract

Information systems security, access management, and privacy are normally understood through the processes of authentication and authorization. This entry provides a brief historical context and then describes several methods of authentication, such as passwords, digital signatures, network topology, smart cards, biometrics, and public key cryptography. It also discusses the most popular methods of authorization, including mandatory, discretionary, and role-based access control.

 Cite
Search for more...
Back to top

Use of cookies on this website

We are using cookies to provide statistics that help us give you the best experience of our site. You can find out more in our Privacy Policy. By continuing to use the site you are agreeing to our use of cookies.