ABSTRACT

Information systems security, access management, and privacy are normally understood through the processes of authentication and authorization. This entry provides a brief historical context and then describes several methods of authentication, such as passwords, digital signatures, network topology, smart cards, biometrics, and public key cryptography. It also discusses the most popular methods of authorization, including mandatory, discretionary, and role-based access control.