Abstract
In recent years many new technologies and techniques have been developed for authenticating individuals attempting to access digital services. Some of these appear to offer new, innovative and flexible ways to improve security, potentially removing the need for relatively expensive hardware devices. We explore some the characteristics of these new methods in relation to the requirements of some example business services. Our intention is not to provide a full or detailed assessment of the methods but rather to provide an initial view which we hope will stimulate further debate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Pannifer, S. (2013). Alternative Authentication – What does it really Provide?. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2013 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-03371-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-658-03371-2_11
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-03370-5
Online ISBN: 978-3-658-03371-2
eBook Packages: Computer ScienceComputer Science (R0)