Skip to Content

Overview of content related to 'authentication'

Syndicate content

This page provides an overview of 8 articles related to 'authentication', listing most recently updated content first. Note that filters may be applied to display a sub-set of articles in this category (see FAQs on filtering for usage tips). Select this link to remove all filters.

 'Inspecting article' image: copyright, used under license from shutterstock.com
Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one. (Excerpt from Wikipedia article: Authentication)

Key statistics

Metadata related to 'authentication' (as derived from all content tagged with this term):

  • Number of articles referring to 'authentication': 178 (10.2% of published articles)
  • Total references to 'authentication' across all Ariadne articles: 436
  • Average number of references to 'authentication' per Ariadne article: 2.45
  • Earliest Ariadne article referring to 'authentication': 1996-03
  • Trending factor of 'authentication': 83.6 (see FAQs on monitoring of trends)

See our 'authentication' overview for more data and comparisons with other tags. For visualisations of metadata related to timelines, bands of recency, top authors, and and overall distribution of authors using this term, see our 'authentication' usage charts. Usage chart icon

Top authors

Ariadne contributors most frequently referring to 'authentication':

  1. andy powell (see articles on this topic by this author)
  2. jon knight (see articles on this topic by this author)
  3. ruth jenkins (see articles on this topic by this author)
  4. lorcan dempsey (see articles on this topic by this author)
  5. francisco pinto (see articles on this topic by this author)

Note: Links to all articles by authors listed above set filters to display articles by each author in the overview below. Select this link to remove all filters.

Title Article summary Datesort icon

Controlling Access in the Electronic Library

Andy Powell and Mark Gillet discuss methods of electronic authentication.

January 1997, issue7, tooled up

Metadata Corner: CrossROADS and Interoperability

Michael Day, Rachel Heery and Andy Powell report on work in progress on enhancements to the ROADS software.

March 1998, issue14, regular column

Metadata: BIBLINK.Checksum

Ian Peacock and Andy Powell describe a proposed algorithm for calculating a checksum for Web pages.

September 1998, issue17, regular column

The JISC Information Environment and Web Services

Andy Powell and Liz Lyon look at possible relationships between the Web Services idea and earlier ideas about seamless access to information.

April 2002, issue31, feature article

5 Step Guide to Becoming a Content Provider in the JISC Information Environment

Andy Powell describes steps which content providers can take to integrate their resources into the JISC IE.

October 2002, issue33, feature article

Mapping the JISC IE Service Landscape

Andy Powell provides a graphical representation of how some well-known services, projects and software applications fit within the JISC Information Environment technical architecture.

July 2003, issue36, feature article

OpenURL Meeting

Linda Humphreys Frances Boyle and Andy Powell give us a description of the OpenURL Meeting held in London, September 2003.

October 2003, issue37, event report

OpenID: Decentralised Single Sign-on for the Web

Andy Powell and David Recordon take a brief look at OpenID and ask what relevance it has to e-learning.

April 2007, issue51, feature article

CSVXML
Syndicate content


about seo