Skip to main content

Authentication

  • Reference work entry
  • First Online:
Encyclopedia of Database Systems
  • 34 Accesses

Definition

Authentication is a broad term, which is normally referred to mechanisms of ensuring that entities are who they claim to be or that data has not been manipulated by unauthorized parties. Thus, entity authentication or identification refers to the means of verifying user identity, after which the user will be granted appropriate privileges. Data origin authentication refers to the means of ensuring that the data comes from an authentic source and has not been tampered with during the transmission.

Historical Background

The need for user authentication in early computer systems arose once it became possible to support multi-user environments. Similarly, data base systems that can be accessed by multiple users with different privileges have to rely on user authentication to enforce proper access control. There is a variety of mechanisms that allow users to authenticate themselves, but password-based authentication is currently the most widely used form of identification.

Data...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Bishop M. Computer security: art and science. Boston: Addison Wesley Professional; 2002.

    Google Scholar 

  2. Haller N. The S/Key one-time password system. In: Proceedings of the Network and Distributed Systems Security Symposium; 1994. p. 151–7.

    Google Scholar 

  3. Menezes A, van Oorschot P, Vanstone S. Handbook of applied cryptography. Boca Raton: CRC; 1996.

    Book  MATH  Google Scholar 

  4. Pfleeger C, Pfleeger S. Security in computing. 3rd ed. Englewood Cliffs: Prentice-Hall; 2003.

    MATH  Google Scholar 

  5. Schneier B. Applied cryptography: protocols, algorithms, and source code in C. 2nd ed. New York: Wiley; 1996.

    MATH  Google Scholar 

  6. Stallings W. Cryptography and network security: principles and practices. 4th ed. New Delhi: Pearson Prentice Hall; 2006.

    Google Scholar 

  7. Stinson D. Cryptography: theory and practice. 3rd ed. Boca Raton: Chapman & Hall/CRC; 2006.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marina Blanton .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Blanton, M. (2018). Authentication. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_32

Download citation

Publish with us

Policies and ethics