This paper has the purpose of presenting intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between involved sides by agreement, rather than by over‐exercised enforcement.
To understand the needs and motivators for the concept, the areas of technology, policies, law, and human mindsets are discussed. The I3A is introduced by discussing two examples of possible solutions that would use the concept in e‐commerce.
In essence, I3A offers an open platform for enabling I3A of cryptographic keys, certificates, and privileges and integrating the use of such with secured applications on a wide variety of devices and environments. The paper argues that for the first time I3A creates a true public key infrastructure (TPKI) and leverages the benefits and the potential of existing and future PKI under one common unconstrained umbrella.
Focuses on a TPKI.
Eigeles, D. (2005), "Intelligent authentication, authorization, and administration (I3A)", Information Management & Computer Security, Vol. 13 No. 5, pp. 419-434. https://doi.org/10.1108/09685220510627296Download as .RIS
Emerald Group Publishing Limited
Copyright © 2005, Emerald Group Publishing Limited