Reference Hub1
Access Control, Authentication, and Authorization

Access Control, Authentication, and Authorization

Joseph Kizza, Florence Migga Kizza
Copyright: © 2008 |Pages: 29
ISBN13: 9781599043791|ISBN10: 1599043793|EISBN13: 9781599043814
DOI: 10.4018/978-1-59904-379-1.ch010
Cite Chapter Cite Chapter

MLA

Joseph Kizza and Florence Migga Kizza. "Access Control, Authentication, and Authorization." Securing the Information Infrastructure, IGI Global, 2008, pp.180-208. https://doi.org/10.4018/978-1-59904-379-1.ch010

APA

J. Kizza & F. Migga Kizza (2008). Access Control, Authentication, and Authorization. IGI Global. https://doi.org/10.4018/978-1-59904-379-1.ch010

Chicago

Joseph Kizza and Florence Migga Kizza. "Access Control, Authentication, and Authorization." In Securing the Information Infrastructure. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-379-1.ch010

Export Reference

Mendeley
Favorite

Abstract

If we were not to allow users into the system, then we would have no problems of security. However, the system would not be utilized, hence, useless. The system must be used, and there must be security. This means we must find a way to access and authenticate users. This way we improve on the security of the system. In this chapter, we focus on three major security mechanisms from our pool of security mechanisms. We cover access control, authentication, and authorization. Before we continue, however, let us define the working terms.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.