IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure Authentication Process for High Sensitive Data E-Services: A Roadmap

Secure Authentication Process for High Sensitive Data E-Services: A Roadmap
View Sample PDF
Author(s): Claudio Agostino Ardagna (University of Milan, Italy), Ernesto Damiani (University of Milan, Italy), Fulvio Frati (University of Milan, Italy)and Salvatore Reale (Siemens Mobile Communication S.p.A, Italy)
Copyright: 2008
Pages: 15
Source title: Information Security and Ethics: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Hamid Nemati (The University of North Carolina at Greensboro, USA)
DOI: 10.4018/978-1-59904-937-3.ch009

Purchase

View Secure Authentication Process for High Sensitive Data E-Services: A Roadmap on the publisher's website for pricing and purchasing information.

Abstract

The widespread diffusion of distributed services, providing access to resources through the Net, has stressed the need of secure ways to authenticate users. The heterogeneity of resources leads to different authentication mechanisms implementations often requiring multiple log-on actions also in intra-domain multi-services scenario. The article presents a roadmap on authentication mechanisms implemented at different levels of services’ software structure.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom