BOOKS - PROGRAMMING - Authentication Technologies for Cloud Computing, IoT and Big Da...
Authentication Technologies for Cloud Computing, IoT and Big Data - Yasser M. Alginahi, Muhammad Nomani Kabir 2019 PDF The Institution of Engineering and Technology BOOKS PROGRAMMING
US $5.82

Views
139786
Authentication Technologies for Cloud Computing, IoT and Big Data
Author: Yasser M. Alginahi, Muhammad Nomani Kabir
Year: 2019
Format: PDF
File size: 26.7 MB
Language: ENG

Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Authentication is the process of verifying the identity of a user or a process that intends to access a secured system through some valid means, e.g., identification card, driver’s license, signature, password, PIN number, iris, or fingerprint. Enforcing authentication process for users or processes is extremely important for information security.

You may also be interested in: