Abstract
Today’s ICT environment is significantly different from the environment, where the currently used eID architectures were developed. Mobile devices (such as tablets or phones) are available for anyone today. These devices use advanced application management systems, leading communication mediums and ever-growing range of peripherals.
Attackers have ever-increasing incentives as the assets on the Internet, and specifically in “the cloud”, grow in value with the overall growth and development of the Internet. They employ a higher computation force, more sophisticated methods and unique tools. Moreover, these attackers often operate from countries, where the violation of cybercrime laws holds little or no penalty. There is also the increasing risk of a cyber-war.
The paper describes selected elements of a new eID architecture and the experience from their practical implementation. The eID architecture is based on published Distributed Identity Infrastructure (DII) concept, which is remarkable for its fully automated life cycle of electronic identities, user-friendly experience and easy integration to ICT systems.
The presentation deals with two main ideas:
• Replacing the static protection of an electronic identity with a dynamic protection
• Complex protection of the cyber/electronic identity in its whole life cycle (including emergency situations) and the protection of the communication channel itself.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Fachmedien Wiesbaden
About this paper
Cite this paper
Neumann, L. (2015). Architectural Elements of a Multidimensional Authentication. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2015. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-10934-9_19
Download citation
DOI: https://doi.org/10.1007/978-3-658-10934-9_19
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-10933-2
Online ISBN: 978-3-658-10934-9
eBook Packages: Computer ScienceComputer Science (R0)