Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Authentication

Handbook of Research on Information Security and Assurance
The verification of the identity of the source of information.
Published in Chapter:
A Formal Verification Centred Development Process for Security Protocols
Tom Coffey (University of Limerick, Ireland)
Copyright: © 2009 |Pages: 14
DOI: 10.4018/978-1-59904-855-0.ch014
Abstract
This chapter concerns the correct and reliable design of modern security protocols. It discusses the importance of formal verification of security protocols prior to their release by publication or implementation. A discussion on logic-based verification of security protocols and its automation provides the reader with an overview of the current state-of-the-art of formal verification of security protocols. The authors propose a formal verification centred development process for security protocols. This process provides strong confidence in the correctness and reliability of the designed protocols. Thus, the usage of weak security protocols in communication systems is prevented. A case-study on the development of a security protocol demonstrates the advantages of the proposed approach. The case-study concludes with remarks on the performance of automated logic-based verification and presents an overview of formal verification results of a range of modern security protocols.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
The Different Aspects of Information Security Education
Validating the identity of a subject. Proving that a subject is actually who they claim to be.
Full Text Chapter Download: US $37.50 Add to Cart
Pervasive Cyberinfrastructure for Personalized Education
The process of determining whether or not a user is who they claim to be.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Identity Management for Wireless Service Access
Authentication is to prove as genuine.
Full Text Chapter Download: US $37.50 Add to Cart
Agent-Facilitated Virtual Marketplace for Airline Ticketing
The process of ensuring that an individual is one who he or she claims to be.
Full Text Chapter Download: US $37.50 Add to Cart
Introduction to Quantum-Resistant Blockchain
Is used by a client to verify that the server is what it purports to be.
Full Text Chapter Download: US $37.50 Add to Cart
Real-Time ECG-Based Biometric Authentication System
A process in which the credentials provided are compared to those on file in a database of authorized users’ information on a local operating system or within an authentication server. If the credentials match, the process is completed, and the user is granted authorization for access. The permissions and folders returned define both the environment the user sees and the way he can interact with it, including hours of access and other rights such as the amount of allocated storage space.
Full Text Chapter Download: US $37.50 Add to Cart
Security Measures for Mobile Ad-Hoc Networks (MANETs)
Authentication is required to make sure communicating parties are the ones who they claim to be.
Full Text Chapter Download: US $37.50 Add to Cart
A Survey on Attacks and Defences on LoRaWAN Gateways
The act of proving or verifying that, for example, a system is who it says it is.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication Practices from Passwords to Biometrics
Verifying the identity of the user. There are three main approaches to user authentication: knowledge-based, possession-based and biometrics-based.
Full Text Chapter Download: US $37.50 Add to Cart
Evaluation of Security Architectures for Mobile Broadband Access
Verification of the identity of a user or network node who claims to be legitimate.
Full Text Chapter Download: US $37.50 Add to Cart
Argument for Improved Security in Local Governments Within the Economic Community of West African States
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information (Harris, 2002 AU11: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Full Text Chapter Download: US $37.50 Add to Cart
Internet and E-Business Security
Procedure that verifies the digital identity of participants in communication. It guaranties that the users are exactly who they say they are.
Full Text Chapter Download: US $37.50 Add to Cart
A Virtual Community for Mobile Agents
The process of ensuring that an individual is one who he or she claims to be.
Full Text Chapter Download: US $37.50 Add to Cart
Telecommunication Management Protocols
Authentication means that a user who is requesting services is a valid user of the network services requested.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
A Case Study in the Role of Trust in Web Service Securities
Provides transaction quality of being authoritative, valid, true, genuine, and worthy of acceptance or belief by reason of conformity to the fact that reality is present in Web services.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Trust in a Global Research Infrastructure
In the context of this chapter, authentication refers to the process of establishing that a usually remote entity is who or what they claim to be (cf. (Chokhani, S., et al, 2003), section 2.) Authentication of an entity to a verifier usually involves the presentation of an identity token, along with a verification by the verifier of the validity of the token, as well as a check that the entity is the one named in the token. A real-life example is presenting a passport to an immigration official, who will check that it is a valid passport and compare the picture with the person presenting the passport. Cf. identification, below.
Full Text Chapter Download: US $37.50 Add to Cart
Biometric Authentication for Cloud Computing
The process of ensuring that the individual is who he or she claims to be, and says nothing about the access rights of the individual.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity of Industrial Internet of Things
A set of procedures for identifying individuals or groups and check their data or system access rights.
Full Text Chapter Download: US $37.50 Add to Cart
Guarding Corporate Data from Social Engineering Attacks
The process of verifying that a person or resource accessing your system is actually how they claim to be.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Agent Authentication and Authorization
The process of ensuring that an individual is who he or she claims to be.
Full Text Chapter Download: US $37.50 Add to Cart
Understanding the Methods behind Cyber Terrorism
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information (Harris, 2002 AU28: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Full Text Chapter Download: US $37.50 Add to Cart
Application of Cloud Computing in Electric Power Utility Systems: Advantages and Risks
The act of proving identity of a computer system user. Actually, this is a process of verifying that user (person, computer etc.) is what it claims to be. This process can be based on something the user knows (password, personal identification number – PIN, etc.), something the user has (ID card, security token, etc.) or something the user is (fingerprint, retinal pattern, signature, voice, face, etc).
Full Text Chapter Download: US $37.50 Add to Cart
Digital Identity in Current Networks
It is the process where an entity must prove digitally that it is the entity that it claims to be.
Full Text Chapter Download: US $37.50 Add to Cart
Status and Future Trends of Multimedia Interactivity on the Web
The procedure of determining whether someone or something is who or what they declare to be. In small business networks authentication is commonly done through the use of passwords and digital certificates (Butcher-Powell, 2005).
Full Text Chapter Download: US $37.50 Add to Cart
Secure Routing with Reputation in MANET
A method of proving someone’s identity, especially if that someone is an authorized user of processes or resources.
Full Text Chapter Download: US $37.50 Add to Cart
Exploring New Handwriting Parameters for Writer Identification
The acceptance or the rejection of the identity given by a person.
Full Text Chapter Download: US $37.50 Add to Cart
Behavioral Based Technologies for Enhancement of Login/Password Systems
The process of verifying the identity alleged by a user that tries to gain access to a system.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Implementing Information Security Using Multimodal Biometrics
Authentication is the service of assuring the identity of a person or device. It assures the recipient that the message or data it receives is from the source it claims to be.
Full Text Chapter Download: US $37.50 Add to Cart
Artificial Intelligence-Based Behavioral Biometrics
It is the process to identify if the claim made is valid or not.
Full Text Chapter Download: US $37.50 Add to Cart
Developing Content Delivery Networks
An option providing a way of identifying a user, typically by having the user enter a valid user-name and valid password before access is granted. The process of authentication is based on each user having a unique set of criteria for gaining access.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Agent Authentication and Authorization in E-Commerce
The process of ensuring that an individual is who he or she claims to be.
Full Text Chapter Download: US $37.50 Add to Cart
Knowledge Management and Information Technology Security Services
Full Text Chapter Download: US $37.50 Add to Cart
Designing an Effective Information Security Policy for Public Organizations: ISO 27001 as a Success Framework
Is the process of verifying a claim of identity. Three different types of information can be used for authentication: something you know (a PIN, a password, mother's maiden name), something you have (magnetic swipe card) or something you are (biometrics).
Full Text Chapter Download: US $37.50 Add to Cart
Security in Ad Hoc Network and Computing Paradigms
A way to confirm the truth of any attribute associated with any data or information that has been claimed as true by an entity.
Full Text Chapter Download: US $37.50 Add to Cart
Biometrics
The action of verifying information such as identity, ownership, or authorization.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Payment
Full Text Chapter Download: US $37.50 Add to Cart
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information.
Full Text Chapter Download: US $37.50 Add to Cart
How Private Is Your Financial Data?: Survey of Authentication Methods in Web and Mobile Banking
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policy in Large Public Organizations: A Case Study Through ISO 27002
The process of verifying a claim of identity. Three different types of information can be used for authentication: something you know (a PIN, a password, mother's maiden name), something you have (magnetic swipe card) or something you are (biometrics).
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
A New Approach in Cloud Computing User Authentication
It refers to any mechanisms by which a system allows or denials the access to the data and keep them stored at cloud sites that accessible only by users who own the data.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments
Authentication is the action of confirming that a user who is requesting services is a valid user of the network services requested.
Full Text Chapter Download: US $37.50 Add to Cart
Security Policy Issues in Internet Banking in Malaysia
The process through which an Internet merchant can be established via a trusted third party that guarantees that the merchant is indeed whom he is.
Full Text Chapter Download: US $37.50 Add to Cart
Machine Learning for Biometrics
Authentication is the decision process where a biometric is sampled from a person with an identity claim and the sampled biometric is compared to a biometric template stored previously for this person to validate the identity claim.
Full Text Chapter Download: US $37.50 Add to Cart
The Emergence of Cryptography in Blockchain Technology
The process of confirming the identity of blockchain transaction participants to ensure that only authorized entities can access and interact with the system.
Full Text Chapter Download: US $37.50 Add to Cart
Extending the Scope of eID Technology: Threats and Opportunities in a Commercial Setting
Establishing or confirming something (or someone) as authentic , that is, that claims made by or about the subject are true.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication Model for Enterprise Resource Planning Network
Any process by which a system verifies the identity of a User who wishes to access it. Since Access Control is normally based on the identity of the User who requests access to a resource.
Full Text Chapter Download: US $37.50 Add to Cart
Spatial Authentication Using Cell Phones
Authentication is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the thing are true.
Full Text Chapter Download: US $37.50 Add to Cart
Keystroke Dynamics and Graphical Authentication Systems
It is the process of verifying the identity alleged by a user who tries to gain access to a system.
Full Text Chapter Download: US $37.50 Add to Cart
A Comparative Study on DNA-Based Cryptosystem
To ensure that the users are they who are claimed to be. It identifies and assures the origin of information.
Full Text Chapter Download: US $37.50 Add to Cart
Implementing a Sound Public Information Security Program
Authentication is the process of identifying an individual, usually based on a user name and password. In security systems, authentication is distinct from authorization, which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual.
Full Text Chapter Download: US $37.50 Add to Cart
SHARE: A European Healthgrid Roadmap
Full Text Chapter Download: US $37.50 Add to Cart
CSAP: Cyber Security Asynchronous Programming With C++20 and C# 8 for Internet of Things and Embedded Software Systems
Represents the process of identifying a user within a computer system, software, or web application.
Full Text Chapter Download: US $37.50 Add to Cart
Genetic-Algorithm-Based Optimization of Fragile Watermarking in Discrete Hartley Transform Domain
The mechanism of checking the originality of a digital content. An alteration made into the digital media is treated as the violation of authenticity.
Full Text Chapter Download: US $37.50 Add to Cart
Grid Computing for Social Science
Validating the identity of a user requiring access to a resource, often achieved in the grid community through the public key infrastructure.
Full Text Chapter Download: US $37.50 Add to Cart
Self-Analysis Technology, Roles, and Cybersecurity in the Virtual Learning Environments
This process involves the validation of the user’s identity before granting network access. The unique characteristics attributed to the user such as their biometric data like iris scans or fingerprints or secret key parsed by the IAAA server and compared to user associated information in the database.
Full Text Chapter Download: US $37.50 Add to Cart
Trends in Government e-Authentication: Policy and Practice
Confirmation of a claim of identity e-Authentication: Authentication carried out electronically
Full Text Chapter Download: US $37.50 Add to Cart
Virtual Private Networks
The act of ensuring that an object or entity is what it is intended to be.
Full Text Chapter Download: US $37.50 Add to Cart
Development of a University Networking Project
A process of identifying secure users in a network.
Full Text Chapter Download: US $37.50 Add to Cart
Ubiquitous Communication Via Residential Gateways
A method to verify and ensure that users are who they say they are – that the user who attempts to get access to networks or functions is in fact the user who is authorized to do so.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Techniques for Remote Reconfiguration of Wireless Embedded Systems
Authentication is the property that something (authentication of data) or someone (authentication of entity) can prove what or who it is declared to be.
Full Text Chapter Download: US $37.50 Add to Cart
An Interoperable Cross-Context Architecture to Manage Distributed Personal E-Health Information
Authentication is the corroboration of a claimed set of attributes or facts with a specified, or understood, level of confidence.
Full Text Chapter Download: US $37.50 Add to Cart
Application of Face Recognition Techniques in Video for Biometric Security: A Review of Basic Methods and Emerging Trends
It is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity. It is a process in which the credentials (e.g. username and password) provided are compared to those in a database of authorized users' information on a local operating system or within an authentication server. If the credentials match, the process is completed and the user is granted authorization for access.
Full Text Chapter Download: US $37.50 Add to Cart
Comparing ZigBee, Bluetooth, UWB, and Wi-Fi
The service used to establish the identity of one device as a member of the set of devices authorized to communicate securely to other devices in the set.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues in Cloud Computing
is the function of specifying access rights to resources related to information security and computer security in general and to access control in particular.
Full Text Chapter Download: US $37.50 Add to Cart
Security Challenges in Fog Computing
Specifies whether user or a node is genuine or not.
Full Text Chapter Download: US $37.50 Add to Cart
Formal Analysis and Design of Authentication Protocols
Authentication is a security goal and refers to the verification of a real or digital identity of a person, an electronic node, or device. In the context of protocols, this refers to the verification of a message sender’s or protocol participant’s identity.
Full Text Chapter Download: US $37.50 Add to Cart
IoT Security: To Secure IoT Devices With Two-Factor Authentication by Using a Secure Protocol
Full Text Chapter Download: US $37.50 Add to Cart
IoT-Enabled 5G Networks for Secure Communication
It is the process of recognizing a user’s identity which verifying the identity of user or information.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Mobile Ad Hoc Networks
The processes of verifying the identity of an entity if it is indeed the entity it declares to be.
Full Text Chapter Download: US $37.50 Add to Cart
Biometric Authentication
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information.
Full Text Chapter Download: US $37.50 Add to Cart
Security for Cross-Tenant Access Control in Cloud Computing
It is a process of verifying a user’s identity. In simple mechanism, this involves using a username and password to prove one identity. In complex system, certificates, images can be used to prove one's identity.
Full Text Chapter Download: US $37.50 Add to Cart
Generic Application Security in Current and Future Networks
Authentication is the attempt to verify the digital identity of the sender of an authentication request.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication Methods for Computer Systems Security
Verifying the identity of the user. There are three main approaches to user authentication: knowledge-based, possession-based, and biometric-based.
Full Text Chapter Download: US $37.50 Add to Cart
Mobility for Secure Multi-Factor
Full Text Chapter Download: US $37.50 Add to Cart
Identity Management Systems: Models, Standards, and COTS Offerings
Verifying user’s assertion of its identification through credentials.
Full Text Chapter Download: US $37.50 Add to Cart
Research Information Management Systems: A Comparative Study
The process of determining whether someone or something, is who or what it declares itself to be.
Full Text Chapter Download: US $37.50 Add to Cart
Access Control Framework for Cloud Computing
The act of confirming the truth of an attribute of a single piece of data (datum) or entity.
Full Text Chapter Download: US $37.50 Add to Cart
Teletranslation
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Big Data Security: Challenges, Recommendations and Solutions
Authentication aims to test and ensure, with a certain probability, that particular data are authentic, i.e., they have not been changed.
Full Text Chapter Download: US $37.50 Add to Cart
Road Map to Information Security Management
It is a method to identify cardholder and merchant before payment. Authentication is the mechanism in which the system will identify the cardholder or merchant, “Is that really you?”
Full Text Chapter Download: US $37.50 Add to Cart
Security of Identity-Based Encryption Algorithms
refers to verifying the identity of a particular user.
Full Text Chapter Download: US $37.50 Add to Cart
Identity Management
Authentication is the process by which an entity provides its identity to another party, for example, by showing photo ID to a bank teller or entering a password on a computer system.
Full Text Chapter Download: US $37.50 Add to Cart
Organizational Password Policy
A security procedure designed to verify that the authorization code entered by a user to gain access to a network or system is valid.
Full Text Chapter Download: US $37.50 Add to Cart
e-Infrastructures Fostering Multi-Center Collaborative Research into the Intensive Care Management of Patients with Brain Injury
The act of establishing or confirming something or someone as authentic. In the security domain this might for example involve electronically confirming the identity of a person wishing to access a given software or hardware resource. Authentication can be achieved in many ways, e.g. usernames/passwords, certificate based systems etc.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy in Distance Education
Proving that a party is who he/she claims to be.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Routing and Mobility in Future IP Networks
Verification of the identity of a user or network node who claims to be legitimate.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Cryptography
This is process of verifying the identity of user or entity.
Full Text Chapter Download: US $37.50 Add to Cart
An Overview of Privilege Management Infrastructure (PMI)
The process by which a system can provably verify the identity of a resource such as an individual, a system, an application, and so forth.
Full Text Chapter Download: US $37.50 Add to Cart
Modelling Wireless Local Area Networking in Higher Education Institutes
Authentication is the method and procedure to identify the users who try to get into the network. The authentication procedure can include physical and software based identification means and nowadays is strictly based on the protocols that define all details. Encryption: Encryption is a method to hide the clear text of the user data from misuse. There are several methods of encoding the original text and nowadays the method of encrypting is dynamically changed all the time during the transmission.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Identity Management in Cloud
Is a process of proving the identity of a previously registered end user.
Full Text Chapter Download: US $37.50 Add to Cart
Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
It is the situation in which it can be verified that a document has been prepared or that it belongs to whom the document claims to belong. Authentication occurs when the user can provide some way to verify that said person is who he claims to be; from that moment he is considered an authorized user.
Full Text Chapter Download: US $37.50 Add to Cart
Internet of Things Application for Intelligent Cities: Security Risk Assessment Challenges
The process or action of verifying the identity of a user or process, e.g. verification based on username and password credentials.
Full Text Chapter Download: US $37.50 Add to Cart
Trustworthy Networks, Authentication, Privacy, and Security Models
Authentication is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself, or a computer program.
Full Text Chapter Download: US $37.50 Add to Cart
Using Technology to Overcome the Password's Contradiction
It’s the process of verifying the identity alleged by a user that tries to gain access to a system.
Full Text Chapter Download: US $37.50 Add to Cart
Security Challenges for Cloud Computing Development Framework in Saudi Arabia
The process of determining whether someone or something is, in fact, who or what it is declared to be before accessing or using a computer system.
Full Text Chapter Download: US $37.50 Add to Cart
An IBE-Based Authenticated Key Transfer Protocol on Elliptic Curves
Permission to access something, which is confidential. The authentication is only provided to authentic users.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues of Smartphones Regarding M-Commerce
The process of verifying that someone is who he/she claims to be.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Security Issues in VANETS for E-Business
Is needed in order to be sure about the identity of the sender or receiver of a message. The attack is called masquerading, that is pretending to be somebody else.
Full Text Chapter Download: US $37.50 Add to Cart
Threats and Vulnerabilities of Mobile Applications
Process of checking the identity of a person or a device.
Full Text Chapter Download: US $37.50 Add to Cart
Fundamental Building Blocks for Security Interoperability in e-Business
The act of establishing or confirming that someone or something is authentic, that claims made by or about the subject are true.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy-Enhancing Technologies
A process for verifying the digital identity of users or processes.
Full Text Chapter Download: US $37.50 Add to Cart
Information Assurance and Security Curriculum Meeting the SIGITE Guidelines
Protection measures and methods of insuring only authorized entities access information. This is linked to concepts such as need-to-know. Authentication suggests control of communication channels and access to information internally and externally as a security service.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR