AUC stands for Area Under the Curve. This refers to the two-dimensional area which is defined by a mathematical plot curve, the x-axis and two boundary points.


Authentication Authentication in computer systems uses application protocols to verify that the identity which is requesting access to a computing system is actually who they say they are. Common authentication protocols are OpenID, NTLM, Kerberos, PAP and CHAP. There is a long list of authentication protocols available, each one being applicable to different systems and ... Read more


Authorization Authorization works right after authentication, in order to grant access and permissions to an identity requesting access to IT resources. The most common authorization protocol is OAuth, now in OAuth 2.0 version. At least one and a resource owner are involved in the authorization process. Authorization works by having an authorization server assign access ... Read more