Title :
Development trends of electronic authentication
Author :
Vladimir Smejkal;Jindrich Kodl
Author_Institution :
Government Board for the Legislative of Czech Republic
Abstract :
Electronic authentication and authorization aspects are one of burning issues tightly connected with information system security. This article provides a description of present trends in authentication and authorization methods development not only from the technological point of view but it intends to demonstrate the necessity of these methods solving in compliance with legal regulations. First part of article deals with the main features of strong authentication methods and describes their pros and cones. In description of methods is pointed to the weakest point of authentication system - the “quality” of user’s working machine mainly in case of remote user connection and resistance of mentioned authentication techniques to attacks. Second part connects the impacts and effects of designed authentication tools with legal regulations and explains why during the authentication (and mainly authorization) process we can and have to rely on the current legal regulations that protect ICT systems, eventually provide protection of individuals and personal data.
Keywords :
"Authentication","Authorization","Information security","Law","Legal factors","Management information systems","Protection","Data security","Information systems","Electronic countermeasures"
Conference_Titel :
Security Technology, 2008. ICCST 2008. 42nd Annual IEEE International Carnahan Conference on
Print_ISBN :
978-1-4244-1816-9
Electronic_ISBN :
2153-0742
DOI :
10.1109/CCST.2008.4751267