O'Reilly logo

Scaling for E-Business by Virgilio A. F. Almeida, Daniel A. Menascé

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

5.2. Security 101

Security can be divided into the following categories: authentication, confidentiality, data integrity, availability (denial of service), and non-repudiation.

5.2.1. Security Categories

Authentication is the process by which two parties involved in a dialogue are given a guarantee that they are indeed interacting with whom they think they are interacting. For example, when you access the website of your favorite online bookstore, you want to make sure that you are indeed interacting with that site and not with an impostor. This is called server authentication. Ghosh describes how impostors can get in the way between a browser and a website [5]. An e-business site may also want to authenticate a business partner to make sure ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required