Introduction

Kabir, M. Nomani and Alginahi, Yasser M. (2019) Introduction. In: Authentication Technologies for Cloud Computing, IoT and Big Data. The Institution of Engineering and Technology (IET), pp. 1-12. ISBN 9781785615573

[img]
Preview
Pdf
Chapter 1.Introduction1.pdf

Download (93kB) | Preview
[img] Pdf
nomani2019-authentication technologies-ch1.pdf
Restricted to Repository staff only

Download (537kB) | Request a copy

Abstract

Authentication is central to any security issue, involving the verification process of the identity of a person or a process to access a secured system. Therefore, authentication is extremely important to guarantee the smooth flow of information without troubles. Authentication process is implemented for data in storage and data in-transit with communication network. Critical systems, e.g., energy, banking and finance, defense, transportation, business process, manufacturing, water system, and emergency services heavily rely on information systems and networks. Authentication has become an integrated part of modern computing and communication technologies, e.g., Internet of Things (IoT), cloud computing, and connected vehicles. This chapter provides an overview of the book, its theme, and purpose by introducing the topics of the book that presents the current technological advances and the new trends in authentication in information security.

Item Type: Book Chapter
Uncontrolled Keywords: Message authentication; cloud computing; Big Data; Internet of Things
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty/Division: Faculty of Computer System And Software Engineering
Depositing User: Noorul Farina Arifin
Date Deposited: 20 Feb 2020 06:55
Last Modified: 20 Feb 2020 07:32
URI: http://umpir.ump.edu.my/id/eprint/27932
Download Statistic: View Download Statistics

Actions (login required)

View Item View Item