Authentication

From Erights

(Difference between revisions)
Jump to: navigation, search
m (Examples)
m (Examples)
Line 14: Line 14:
* Debian packages (objects), after they are downloaded, before they are installed, are authenticated. The authentication procedure in this case estabilishes that given package (object) was issued by Debian community (subject). This step is useful if our trust in the Debian community is higher than to any other random subject. Genuine installation CDs contain appropriate keyring.
* Debian packages (objects), after they are downloaded, before they are installed, are authenticated. The authentication procedure in this case estabilishes that given package (object) was issued by Debian community (subject). This step is useful if our trust in the Debian community is higher than to any other random subject. Genuine installation CDs contain appropriate keyring.
-
* Current technology well supports authentication of e-mails.
+
* Current technology well supports authentication of e-mails (via various [http://en.wikipedia.org/wiki/MUA MUA] plugins).

Revision as of 17:16, 24 July 2009

Definition

Authentication is a process of estabilishing which subject:

  • created or is responsible for the contents of a given document;
  • created or is responsible for the behavior of a given program.

Notes

Authentication should not be confused with the following two other concepts:

  • identity checking
  • authorization

Examples

  • Debian packages (objects), after they are downloaded, before they are installed, are authenticated. The authentication procedure in this case estabilishes that given package (object) was issued by Debian community (subject). This step is useful if our trust in the Debian community is higher than to any other random subject. Genuine installation CDs contain appropriate keyring.
  • Current technology well supports authentication of e-mails (via various MUA plugins).
Personal tools
more tools