AuthN
AuthN
dictionary-acronym
Spelled-out Forms
See Also
-
-
-
Awaysheh et al., 2019 (Bibliography) — Awaysheh, F., Cabaleiro, J., Pena, T., Alazab, M., 2019. Poster: A Pluggable Authentication Module for Big Data Federation Architecture. Presented at the 24th ACM Symposium, p. 225. https://doi.org/10.1145/3322431.3326448
-
-
Beautement et al., 2008 (Bibliography) — Beautement, A., Sasse, M.A., Wonham, M., 2008. The Compliance Budget: Managing Security Behaviour in Organisations, in: Proceedings of the 2008 Workshop on New Security Paradigms - NSPW ’08. Presented at the 2008 workshop, ACM Press, Lake Tahoe, California, USA, p. 47. https://doi.org/10.1145/1595676.1595684
-
-
-
-
-
-
-
-
-
-
-
Kerberos-Enabled Cross-Realm Authentication with On-Premises Microsoft Active Directory (Architecture) — This reference architecture presents Kerberos-enabled authentication cross-realms with on-premises Microsoft Active Directory.
This is a high-level view. In practice, the Kerberos protocol is composed of multiple sub-protocols, multiple versions, and multiple options. The Bibliography section provides links to detailed references on the topic.
-
-
NIST IR 7983, 2014 (Bibliography) — Steves, M., Chisnell, D., Sasse, A., Krol, K., Theofanos, M., Wald, H., 2014. NIST IR 7983: Report: Authentication Diary Study (No. NIST IR 7983). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.IR.7983
-
-
-
-
-
-
-
-
-
-
-
-
-
Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.
This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.