Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Authorization

Handbook of Research on Emerging Developments in Data Privacy
Verifying user’s privileges to a system.
Published in Chapter:
How Private Is Your Financial Data?: Survey of Authentication Methods in Web and Mobile Banking
Vidya Mulukutla (State University of New York – Buffalo, USA), Manish Gupta (State University of New York – Buffalo, USA), and H. R. Rao (State University of New York – Buffalo, USA)
Copyright: © 2015 |Pages: 28
DOI: 10.4018/978-1-4666-7381-6.ch009
Abstract
The ease and convenience of Internet Banking or e-banking has made it the most preferred way for customers as well as the banking industry alike. The fact that e-banking enables remote accessibility of a customer's account translates to round-the-clock service from the bank and has made this mode of operation a success in every sense. The starting and most important point for which would be the authentication to customer's financial data. This chapter sheds light on the different authentication mechanisms that could be followed as per the situational demands taking into consideration the various threat environments and possible vulnerabilities in the system. The advantages and disadvantages arising out of different authentication mechanisms are presented with the possible attack scenarios enumerated. An overview of the personal computer environ and the mobile environ are discussed. The chapter will be invaluable for managers and professionals in understanding the current authentication landscape.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Security Policy Issues in Internet Banking in Malaysia
The ability to control the actions of a person or entity based on his/its identity.
Full Text Chapter Download: US $37.50 Add to Cart
Pervasive Cyberinfrastructure for Personalized Education
The process of determining the artifacts to which a user has access.
Full Text Chapter Download: US $37.50 Add to Cart
An Overview of Privilege Management Infrastructure (PMI)
The process of determining if a requesting party has sufficient rights to access a resource.
Full Text Chapter Download: US $37.50 Add to Cart
The Different Aspects of Information Security Education
Granting privileges and allowing access to objects for specified subjects.
Full Text Chapter Download: US $37.50 Add to Cart
Activity: Studying the IT Audit Area Controls
The bestowment of authority to participate or commit deliberate actions.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Within an E-Learning Environment
Involves determining whether or not the authenticated party has the right to access the information in question (Von Solms & Eloff, 2004).
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues of Smartphones Regarding M-Commerce
The process of giving someone permission/ right to do or own something.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Agent Authentication and Authorization in E-Commerce
The process of giving access rights to an individual or entity.
Full Text Chapter Download: US $37.50 Add to Cart
Security for Cross-Tenant Access Control in Cloud Computing
In computing world authorization refers to specifying access rights/privileges to computing resources.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication
The process of granting of permission (e.g. file access, download of a video, allow access to a building) on the basis of authenticated identification.
Full Text Chapter Download: US $37.50 Add to Cart
Data Protection and Data Security Regarding Grid Computing in Biomedical Research
The act of providing and checking the authority of the user on a specific resource, informally speaking “who can do what”.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments
Authorization is the action of granting the specific types of service to a user depending on the authentication.
Full Text Chapter Download: US $37.50 Add to Cart
Self-Analysis Technology, Roles, and Cybersecurity in the Virtual Learning Environments
States the rights and services available to an end user after being granted network access.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Identity Management in Cloud
Is a process of granting or denying access rights for a resource to an authenticated end user.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Agent Authentication and Authorization
The process of giving access rights to an individual or entity.
Full Text Chapter Download: US $37.50 Add to Cart
Towards Privacy Awareness in Future Internet Technologies
act of determining whether requesting entity is allowed access to a resource
Full Text Chapter Download: US $37.50 Add to Cart
Implementing a Sound Public Information Security Program
Authorization is the privilege granted to an individual by management to access information based upon the individual’s clearance and need-to-know principle. It is the granting to a user, program, or process the right of access.
Full Text Chapter Download: US $37.50 Add to Cart
Identity Management
Authorisation is the process of granting access to a service or information based on a user’s role in an organisation.
Full Text Chapter Download: US $37.50 Add to Cart
Electronic Payment
The process whereby a merchant requests permission for the card to be used for a particular transaction amount.
Full Text Chapter Download: US $37.50 Add to Cart
Grid Computing for Social Science
Validating and enforcing the privileges of a user requiring access to a resource, often achieved through access control lists or security policies.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Application of Cloud Computing in Electric Power Utility Systems: Advantages and Risks
Process of verifying that user (person, computer etc.) is permitted to take an action within the system, usually after successful authentication. It consists of a predefined set of permissions and restrictions for the particular user (read-only rights, read/write rights, change rights, etc.).
Full Text Chapter Download: US $37.50 Add to Cart
Telecommunication Management Protocols
Authorization means that a user can access some services based on its authentication, but the access in only provided for a given amount of time. Therefore authorization is a kind of limitation of the authentication rights.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy-Enhancing Technologies
A process for verifying whether an identified user or role enjoys specific access rights to certain resources.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR