Linktionary search and index page

Site home page
(news and notices)

Get alerts when Linktionary is updated

Book updates and addendums

Get info about the Encyclopedia of Networking and Telecommunicatons, 3rd edition (2001)

Download the electronic version of the Encyclopedia of Networking, 2nd edition (1996). It's free!

Contribute to this site

Electronic licensing info

 

 

 

Authentication and Authorization
Related Entries and Web Links

Main Topic   New/Updated Information   Web Links

  
Search Linktionary (powered by FreeFind)

Note: Many topics at this site are reduced versions of the text in "The Encyclopedia of Networking and Telecommunications." Search results will not be as extensive as a search of the book's CD-ROM.


Related Entries

Access Control

Accounting on the Internet

Accounts

Anonymous (Guest) Access

Biometric Access Devices

Capstone

CDSA (Common Data Security Architecture)

Certificates and Certification Systems

CHAP (Challenge Handshake Authentication Protocol)

Cryptography

DIAMETER

Digital Signatures

EAP (Extensible Authentication Protocol)

File Sharing

Firewall

FORTEZZA

Hacking and Hackers

Hash Functions

IPSec (IP Security)

Kerberos Authentication Protocol

Key Distribution and Management

L2TP (Layer 2 Tunneling Protocol)

Login Scripts

Logons and Logon Accounts

Microsoft Windows File Systems

Mobile Computing

Mobile IP

NAS (Network Access Server)

NAT (Network Address Translation)

Network Operating Systems

One-Time Password Authentication

OSP (Open Settlement Protocol)

PAP (Password Authentication Protocol)

Passwords

PKI (Public-Key Infrastructure)

PPP (Point-to-Point Protocol)

Public-Key Cryptography

Quantum Cryptography

RADIUS (Remote Authentication Dial-In User Service)

Remote Access

Rights and Permissions

Roaming

RSA

RSIP (Realm-Specific IP)

Secret-Key Cryptography

Security Auditing

Security

S-HTTP (Secure Hypertext Transfer Protocol)

SKIP (Simple Key Management for Internet Protocols)

Smart Cards

SSH (Secure Shell)

TACACS (Terminal Access Controller Access Control System)

Token-Based Authentication

Trust Relationships and Trust Management

Users and Groups

Virus and Antivirus Issues

VPN (Virtual Private Network)

X.509 Certificates

Web Links
Click here for newer links

Shiva's white paper on remote access security

http://www.shiva.com/remote/prodinfo/security/

"A Distributed Authorization Model for WWW" by Jose Kahan Oblatt

http://www.isoc.org/HMP/PAPER/107/abst.html

Microsoft Security page

http://www.microsoft.com/security/

Google Web Directory Authentication

http://directory.google.com/Top/Computers/Security/Authentication/

Bitpipe (search for "authentication")

http://www.bitpipe.com/

Cisco AAA Implementation Case Study

http://www.cisco.com/univercd/cc/td/doc/cisintwk/intsolns/aaaisg/

CyberSafe Corporation

http://www.cybersafe.com

New Web Links

--Pending--

--Pending--

--Pending--

--Pending--




Copyright (c) 2001 Tom Sheldon and Big Sur Multimedia.
All rights reserved under Pan American and International copyright conventions.