... computer into the picture, the situation changes dramatically. Computers (atleast today's computers) don't have eyes, ears, or noses. Even if they did, the current state-of -the- art inpattern ... andauthorization, and how they relate to each other. 2.1.1 Authentication Simply put, authentication is the process of verifying the identity of a particular user. To authenticate auser, the user is asked ... (MIT) in the early 1980s. The MIT faculty at the time recognized that the explosion ofwidely available, inexpensive computers would transform the computing industry. 1.1.1.1 The time-sharing...