ABSTRACT

In this chapter, we look at some key basic authorization technologies, i.e., technologies that are used to control access to the network or systems so that only authorized users are allowed to gain access to specific network and system resources such as particular applications (e.g., e-mail server, host applications, etc.).