Authentication, Access Control, and Information Flow
Published Online: 16 MAR 2009
Copyright © 2007 by John Wiley & Sons, Inc.
Wiley Encyclopedia of Computer Science and Engineering
How to Cite
Ray, A. 2009. Authentication, Access Control, and Information Flow. Wiley Encyclopedia of Computer Science and Engineering. 1–12.
- Published Online: 16 MAR 2009
With the enormous quantity of sensitive information (financial and personal data, medical records) that is being stored inside computer-based systems on a daily basis, the survival of our modern economy depends critically on the storage of these data and the intergrity of the transactions that operate on it. When trying to analyze whether a certain computer-based system is “secure,” engineers typically question the authentication, message authentication, intergrity, and access control, In this article, we discuss each concept in detail with special attention paid to their actual implementation in real-world software systems.
- access control;
- information flow;
- computer security