Introduction
Authentication is central to any security issue, involving the verification process of the identity of a person or a process to access a secured system. Therefore, authentication is extremely important to guarantee the smooth flow of information without troubles. Authentication process is implemente...
Saved in:
Main Authors: | , |
---|---|
Format: | Book Section |
Language: | English English |
Published: |
The Institution of Engineering and Technology (IET)
2019
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/27932/1/Chapter%201.Introduction1.pdf http://umpir.ump.edu.my/id/eprint/27932/7/nomani2019-authentication%20technologies-ch1.pdf http://umpir.ump.edu.my/id/eprint/27932/ https://doi.org/10.1049/PBSE009E_ch1 https://doi.org/10.1049/PBSE009E_ch1 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Pahang |
Language: | English English |
id |
my.ump.umpir.27932 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.279322020-02-20T07:32:00Z http://umpir.ump.edu.my/id/eprint/27932/ Introduction Kabir, M. Nomani Alginahi, Yasser M. QA75 Electronic computers. Computer science Authentication is central to any security issue, involving the verification process of the identity of a person or a process to access a secured system. Therefore, authentication is extremely important to guarantee the smooth flow of information without troubles. Authentication process is implemented for data in storage and data in-transit with communication network. Critical systems, e.g., energy, banking and finance, defense, transportation, business process, manufacturing, water system, and emergency services heavily rely on information systems and networks. Authentication has become an integrated part of modern computing and communication technologies, e.g., Internet of Things (IoT), cloud computing, and connected vehicles. This chapter provides an overview of the book, its theme, and purpose by introducing the topics of the book that presents the current technological advances and the new trends in authentication in information security. The Institution of Engineering and Technology (IET) Alginahi, Yasser M. Kabir, M. Nomani 2019 Book Section PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/27932/1/Chapter%201.Introduction1.pdf pdf en http://umpir.ump.edu.my/id/eprint/27932/7/nomani2019-authentication%20technologies-ch1.pdf Kabir, M. Nomani and Alginahi, Yasser M. (2019) Introduction. In: Authentication Technologies for Cloud Computing, IoT and Big Data. The Institution of Engineering and Technology (IET), pp. 1-12. ISBN 9781785615573 https://doi.org/10.1049/PBSE009E_ch1 https://doi.org/10.1049/PBSE009E_ch1 |
institution |
Universiti Malaysia Pahang |
building |
UMP Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang |
content_source |
UMP Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Kabir, M. Nomani Alginahi, Yasser M. Introduction |
description |
Authentication is central to any security issue, involving the verification process of the identity of a person or a process to access a secured system. Therefore, authentication is extremely important to guarantee the smooth flow of information without troubles. Authentication process is implemented for data in storage and data in-transit with communication network. Critical systems, e.g., energy, banking and finance, defense, transportation, business process, manufacturing, water system, and emergency services heavily rely on information systems and networks. Authentication has become an integrated part of modern computing and communication technologies, e.g., Internet of Things (IoT), cloud computing, and connected vehicles. This chapter provides an overview of the book, its theme, and purpose by introducing the topics of the book that presents the current technological advances and the new trends in authentication in information security. |
author2 |
Alginahi, Yasser M. |
author_facet |
Alginahi, Yasser M. Kabir, M. Nomani Alginahi, Yasser M. |
format |
Book Section |
author |
Kabir, M. Nomani Alginahi, Yasser M. |
author_sort |
Kabir, M. Nomani |
title |
Introduction |
title_short |
Introduction |
title_full |
Introduction |
title_fullStr |
Introduction |
title_full_unstemmed |
Introduction |
title_sort |
introduction |
publisher |
The Institution of Engineering and Technology (IET) |
publishDate |
2019 |
url |
http://umpir.ump.edu.my/id/eprint/27932/1/Chapter%201.Introduction1.pdf http://umpir.ump.edu.my/id/eprint/27932/7/nomani2019-authentication%20technologies-ch1.pdf http://umpir.ump.edu.my/id/eprint/27932/ https://doi.org/10.1049/PBSE009E_ch1 https://doi.org/10.1049/PBSE009E_ch1 |
_version_ |
1662754798177353728 |