Intelligent authentication, authorization, and administration (I3A)

Dan Eigeles (Kiryat Ata, Israel)

Information Management & Computer Security

ISSN: 0968-5227

Publication date: 1 December 2005

Abstract

Purpose

This paper has the purpose of presenting intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between involved sides by agreement, rather than by over‐exercised enforcement.

Design/methodology/approach

To understand the needs and motivators for the concept, the areas of technology, policies, law, and human mindsets are discussed. The I3A is introduced by discussing two examples of possible solutions that would use the concept in e‐commerce.

Findings

In essence, I3A offers an open platform for enabling I3A of cryptographic keys, certificates, and privileges and integrating the use of such with secured applications on a wide variety of devices and environments. The paper argues that for the first time I3A creates a true public key infrastructure (TPKI) and leverages the benefits and the potential of existing and future PKI under one common unconstrained umbrella.

Originality/value

Focuses on a TPKI.

Keywords

Citation

Eigeles, D. (2005), "Intelligent authentication, authorization, and administration (I3A)", Information Management & Computer Security, Vol. 13 No. 5, pp. 419-434. https://doi.org/10.1108/09685220510627296

Download as .RIS

Publisher

:

Emerald Group Publishing Limited

Copyright © 2005, Emerald Group Publishing Limited

Please note you might not have access to this content

You may be able to access this content by login via Shibboleth, Open Athens or with your Emerald account.
If you would like to contact us about accessing this content, click the button and fill out the form.
To rent this content from Deepdyve, please click the button.