Standard Article

Authentication, Access Control, and Information Flow

  1. Arnab Ray

Published Online: 16 MAR 2009

DOI: 10.1002/9780470050118.ecse028

Wiley Encyclopedia of Computer Science and Engineering

Wiley Encyclopedia of Computer Science and Engineering

How to Cite

Ray, A. 2009. Authentication, Access Control, and Information Flow. Wiley Encyclopedia of Computer Science and Engineering. 1–12.

Author Information

  1. Fraunhofer Center for Experimental Software Engineering, College Park, Maryland

Publication History

  1. Published Online: 16 MAR 2009

Abstract

With the enormous quantity of sensitive information (financial and personal data, medical records) that is being stored inside computer-based systems on a daily basis, the survival of our modern economy depends critically on the storage of these data and the intergrity of the transactions that operate on it. When trying to analyze whether a certain computer-based system is “secure,” engineers typically question the authentication, message authentication, intergrity, and access control, In this article, we discuss each concept in detail with special attention paid to their actual implementation in real-world software systems.

Keywords:

  • authorization;
  • access control;
  • information flow;
  • computer security