DocumentCode :
3630383
Title :
Development trends of electronic authentication
Author :
Vladimir Smejkal;Jindrich Kodl
Author_Institution :
Government Board for the Legislative of Czech Republic
fYear :
2008
Firstpage :
1
Lastpage :
6
Abstract :
Electronic authentication and authorization aspects are one of burning issues tightly connected with information system security. This article provides a description of present trends in authentication and authorization methods development not only from the technological point of view but it intends to demonstrate the necessity of these methods solving in compliance with legal regulations. First part of article deals with the main features of strong authentication methods and describes their pros and cones. In description of methods is pointed to the weakest point of authentication system - the “quality” of user’s working machine mainly in case of remote user connection and resistance of mentioned authentication techniques to attacks. Second part connects the impacts and effects of designed authentication tools with legal regulations and explains why during the authentication (and mainly authorization) process we can and have to rely on the current legal regulations that protect ICT systems, eventually provide protection of individuals and personal data.
Keywords :
"Authentication","Authorization","Information security","Law","Legal factors","Management information systems","Protection","Data security","Information systems","Electronic countermeasures"
Publisher :
ieee
Conference_Titel :
Security Technology, 2008. ICCST 2008. 42nd Annual IEEE International Carnahan Conference on
ISSN :
1071-6572
Print_ISBN :
978-1-4244-1816-9
Electronic_ISBN :
2153-0742
Type :
conf
DOI :
10.1109/CCST.2008.4751267
Filename :
4751267
Link To Document :
بازگشت