Reference Hub5
Secure Authentication Process for High Sensitive Data E-Services: A Roadmap

Secure Authentication Process for High Sensitive Data E-Services: A Roadmap

Claudio Agostino Ardagna, Ernesto Damiani, Fulvio Frati, Salvatore Reale
Copyright: © 2007 |Volume: 9 |Issue: 1 |Pages: 16
ISSN: 1548-7717|EISSN: 1548-7725|ISSN: 1548-7717|EISBN13: 9781615205080|EISSN: 1548-7725|DOI: 10.4018/jcit.2007010102
Cite Article Cite Article

MLA

Ardagna, Claudio Agostino, et al. "Secure Authentication Process for High Sensitive Data E-Services: A Roadmap." JCIT vol.9, no.1 2007: pp.20-35. http://doi.org/10.4018/jcit.2007010102

APA

Ardagna, C. A., Damiani, E., Frati, F., & Reale, S. (2007). Secure Authentication Process for High Sensitive Data E-Services: A Roadmap. Journal of Cases on Information Technology (JCIT), 9(1), 20-35. http://doi.org/10.4018/jcit.2007010102

Chicago

Ardagna, Claudio Agostino, et al. "Secure Authentication Process for High Sensitive Data E-Services: A Roadmap," Journal of Cases on Information Technology (JCIT) 9, no.1: 20-35. http://doi.org/10.4018/jcit.2007010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The widespread diffusion of distributed services, providing access to resources through the Net, has stressed the need of secure ways to authenticate users. The heterogeneity of resources leads to different authentication mechanisms implementations often requiring multiple log-on actions also in intra-domain multi-services scenario. The article presents a roadmap on authentication mechanisms implemented at different levels of services’ software structure.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.