Abstract
Identity and Access Management (IAM) namely authentication is critical factor of ICT systems security. Security of ICT systems using remote access cannot be better than the quality of authentication. If the system is not able to distinguish between users and between a user and an attacker it is not possible to expect using of any selective security measures (including access right enforcing).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Literature
Allan, Ant: Strategic Planning Assumption: By year-end 2013, fewer than 10% of all authentication events will involve discrete, specialised authentication hardware of any kind. In: Identity and Access Management – Research Highlights, Gartner Corporate Marketing, 2011
Neumann, Libor: An analysis of e-identity organizational and technological solutions within a single European information space. In: e-Challenges e-2007, The Hague, Netherlands, 2007, pp. 1326-1333.
[Neum08] Neumann, Libor: Anonymous, Liberal, and User-Centric Electronic Identity – A New, Systematic Design of eID Infrastructure, In: e-Challenges e-2008, 22-24 October 2008, Stockholm, Sweden.
Neumann, Libor: ALUCID (Automatic Liberal and User Centric electronic Identity) and Its Integration. Retrieved from http://www.alucid.eu/en/download/
Neumann, Libor: Cyber Identity is NOT Human Identity – A System Weaknesses Analysis of Current eID Technologies. In: EEMA eIdentity Management Conference, 12 June 2012, Paris, France
PASSIVE: D3.2.1 Interim PASSIVE Architecture
PASSIVE: D6.2.2. – Standardisation and Exploitation Report
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Neumann, L. et al. (2012). Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_19
Download citation
DOI: https://doi.org/10.1007/978-3-658-00333-3_19
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-00332-6
Online ISBN: 978-3-658-00333-3
eBook Packages: Computer ScienceComputer Science (R0)