Introduction

Authentication is central to any security issue, involving the verification process of the identity of a person or a process to access a secured system. Therefore, authentication is extremely important to guarantee the smooth flow of information without troubles. Authentication process is implemente...

Full description

Bibliographic Details
Main Authors: Kabir, M. Nomani, Alginahi, Yasser M.
Format: Book Section
Language:English
English
Published: The Institution of Engineering and Technology (IET) 2019
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/27932/
http://umpir.ump.edu.my/id/eprint/27932/
http://umpir.ump.edu.my/id/eprint/27932/
http://umpir.ump.edu.my/id/eprint/27932/1/Chapter%201.Introduction1.pdf
http://umpir.ump.edu.my/id/eprint/27932/7/nomani2019-authentication%20technologies-ch1.pdf
id ump-27932
recordtype eprints
spelling ump-279322020-02-20T07:32:00Z http://umpir.ump.edu.my/id/eprint/27932/ Introduction Kabir, M. Nomani Alginahi, Yasser M. QA75 Electronic computers. Computer science Authentication is central to any security issue, involving the verification process of the identity of a person or a process to access a secured system. Therefore, authentication is extremely important to guarantee the smooth flow of information without troubles. Authentication process is implemented for data in storage and data in-transit with communication network. Critical systems, e.g., energy, banking and finance, defense, transportation, business process, manufacturing, water system, and emergency services heavily rely on information systems and networks. Authentication has become an integrated part of modern computing and communication technologies, e.g., Internet of Things (IoT), cloud computing, and connected vehicles. This chapter provides an overview of the book, its theme, and purpose by introducing the topics of the book that presents the current technological advances and the new trends in authentication in information security. The Institution of Engineering and Technology (IET) Alginahi, Yasser M. Kabir, M. Nomani 2019 Book Section PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/27932/1/Chapter%201.Introduction1.pdf pdf en http://umpir.ump.edu.my/id/eprint/27932/7/nomani2019-authentication%20technologies-ch1.pdf Kabir, M. Nomani and Alginahi, Yasser M. (2019) Introduction. In: Authentication Technologies for Cloud Computing, IoT and Big Data. The Institution of Engineering and Technology (IET), pp. 1-12. ISBN 9781785615573 https://doi.org/10.1049/PBSE009E_ch1 https://doi.org/10.1049/PBSE009E_ch1
repository_type Digital Repository
institution_category Local University
institution Universiti Malaysia Pahang
building UMP Institutional Repository
collection Online Access
language English
English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Kabir, M. Nomani
Alginahi, Yasser M.
Introduction
description Authentication is central to any security issue, involving the verification process of the identity of a person or a process to access a secured system. Therefore, authentication is extremely important to guarantee the smooth flow of information without troubles. Authentication process is implemented for data in storage and data in-transit with communication network. Critical systems, e.g., energy, banking and finance, defense, transportation, business process, manufacturing, water system, and emergency services heavily rely on information systems and networks. Authentication has become an integrated part of modern computing and communication technologies, e.g., Internet of Things (IoT), cloud computing, and connected vehicles. This chapter provides an overview of the book, its theme, and purpose by introducing the topics of the book that presents the current technological advances and the new trends in authentication in information security.
author2 Alginahi, Yasser M.
author_facet Alginahi, Yasser M.
Kabir, M. Nomani
Alginahi, Yasser M.
format Book Section
author Kabir, M. Nomani
Alginahi, Yasser M.
author_sort Kabir, M. Nomani
title Introduction
title_short Introduction
title_full Introduction
title_fullStr Introduction
title_full_unstemmed Introduction
title_sort introduction
publisher The Institution of Engineering and Technology (IET)
publishDate 2019
url http://umpir.ump.edu.my/id/eprint/27932/
http://umpir.ump.edu.my/id/eprint/27932/
http://umpir.ump.edu.my/id/eprint/27932/
http://umpir.ump.edu.my/id/eprint/27932/1/Chapter%201.Introduction1.pdf
http://umpir.ump.edu.my/id/eprint/27932/7/nomani2019-authentication%20technologies-ch1.pdf
first_indexed 2023-09-18T22:43:48Z
last_indexed 2023-09-18T22:43:48Z
_version_ 1777417090236416000