ISSE 2015 pp 227-239 | Cite as

Architectural Elements of a Multidimensional Authentication

Conference paper

Abstract

Today’s ICT environment is significantly different from the environment, where the currently used eID architectures were developed. Mobile devices (such as tablets or phones) are available for anyone today. These devices use advanced application management systems, leading communication mediums and ever-growing range of peripherals.

Attackers have ever-increasing incentives as the assets on the Internet, and specifically in “the cloud”, grow in value with the overall growth and development of the Internet. They employ a higher computation force, more sophisticated methods and unique tools. Moreover, these attackers often operate from countries, where the violation of cybercrime laws holds little or no penalty. There is also the increasing risk of a cyber-war.

The paper describes selected elements of a new eID architecture and the experience from their practical implementation. The eID architecture is based on published Distributed Identity Infrastructure (DII) concept, which is remarkable for its fully automated life cycle of electronic identities, user-friendly experience and easy integration to ICT systems.

The presentation deals with two main ideas:

• Replacing the static protection of an electronic identity with a dynamic protection

• Complex protection of the cyber/electronic identity in its whole life cycle (including emergency situations) and the protection of the communication channel itself.

Keywords

Entropy Lost Protec 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Fachmedien Wiesbaden 2015

Authors and Affiliations

  1. 1.ANECT a.sBrünnCzech Republic

Personalised recommendations