Skip to main content

Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity

  • Chapter
  • First Online:
ISSE 2012 Securing Electronic Business Processes

Abstract

Identity and Access Management (IAM) namely authentication is critical factor of ICT systems security. Security of ICT systems using remote access cannot be better than the quality of authentication. If the system is not able to distinguish between users and between a user and an attacker it is not possible to expect using of any selective security measures (including access right enforcing).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literature

  1. Allan, Ant: Strategic Planning Assumption: By year-end 2013, fewer than 10% of all authentication events will involve discrete, specialised authentication hardware of any kind. In: Identity and Access Management – Research Highlights, Gartner Corporate Marketing, 2011

    Google Scholar 

  2. Neumann, Libor: An analysis of e-identity organizational and technological solutions within a single European information space. In: e-Challenges e-2007, The Hague, Netherlands, 2007, pp. 1326-1333.

    Google Scholar 

  3. [Neum08] Neumann, Libor: Anonymous, Liberal, and User-Centric Electronic Identity – A New, Systematic Design of eID Infrastructure, In: e-Challenges e-2008, 22-24 October 2008, Stockholm, Sweden.

    Google Scholar 

  4. Neumann, Libor: ALUCID (Automatic Liberal and User Centric electronic Identity) and Its Integration. Retrieved from http://www.alucid.eu/en/download/

  5. Neumann, Libor: Cyber Identity is NOT Human Identity – A System Weaknesses Analysis of Current eID Technologies. In: EEMA eIdentity Management Conference, 12 June 2012, Paris, France

    Google Scholar 

  6. PASSIVE: D3.2.1 Interim PASSIVE Architecture

    Google Scholar 

  7. PASSIVE: D6.2.2. – Standardisation and Exploitation Report

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Libor Neumann .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Neumann, L. et al. (2012). Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-00333-3_19

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-00332-6

  • Online ISBN: 978-3-658-00333-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics