Authentication Methods for Computer Systems Security

Zippy Erlich, Moshe Zviran

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

With the rapid growth of networked systems and applications such as e-commerce, the demand for effective computer security is increasing. Most computer systems are protected through a process of user identification and authentication. While identification is usually non-private information provided by users to identify themselves and can be known by system administrators and other system users, authentication provides secret, private user information which can authenticate their identity. There are various authentication approaches and techniques, from passwords to public keys (Smith, 2002). This article presents the three main authentication approaches, their technology and implementation issues, and the factors to be considered when choosing an authentication method.

Original languageEnglish
Title of host publicationEncyclopedia of Information Science and Technology
Subtitle of host publicationSecond Edition
PublisherIGI Global
Pages288-293
Number of pages6
ISBN (Electronic)9781605660271
ISBN (Print)9781605660264
DOIs
StatePublished - 1 Jan 2008

Bibliographical note

Publisher Copyright:
© 2009 by IGI Global. All rights reserved.

Fingerprint

Dive into the research topics of 'Authentication Methods for Computer Systems Security'. Together they form a unique fingerprint.

Cite this