BOOKS - PROGRAMMING - Authentication Technologies for Cloud Computing, IoT and Big Da...
US $5.82
139786
139786
Authentication Technologies for Cloud Computing, IoT and Big Data
Author: Yasser M. Alginahi, Muhammad Nomani Kabir
Year: 2019
Format: PDF
File size: 26.7 MB
Language: ENG
Year: 2019
Format: PDF
File size: 26.7 MB
Language: ENG
Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Authentication is the process of verifying the identity of a user or a process that intends to access a secured system through some valid means, e.g., identification card, driver’s license, signature, password, PIN number, iris, or fingerprint. Enforcing authentication process for users or processes is extremely important for information security.