Intelligent authentication, authorization, and administration (I3A)

Dan Eigeles (Kiryat Ata, Israel)

Information Management & Computer Security

ISSN: 0968-5227

Publication date: 1 December 2005



This paper has the purpose of presenting intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between involved sides by agreement, rather than by over‐exercised enforcement.


To understand the needs and motivators for the concept, the areas of technology, policies, law, and human mindsets are discussed. The I3A is introduced by discussing two examples of possible solutions that would use the concept in e‐commerce.


In essence, I3A offers an open platform for enabling I3A of cryptographic keys, certificates, and privileges and integrating the use of such with secured applications on a wide variety of devices and environments. The paper argues that for the first time I3A creates a true public key infrastructure (TPKI) and leverages the benefits and the potential of existing and future PKI under one common unconstrained umbrella.


Focuses on a TPKI.



Eigeles, D. (2005), "Intelligent authentication, authorization, and administration (I3A)", Information Management & Computer Security, Vol. 13 No. 5, pp. 419-434.

Download as .RIS



Emerald Group Publishing Limited

Copyright © 2005, Emerald Group Publishing Limited

Please note you might not have access to this content

You may be able to access this content by login via Shibboleth, Open Athens or with your Emerald account.
If you would like to contact us about accessing this content, click the button and fill out the form.
To rent this content from Deepdyve, please click the button.