To read this content please select one of the options below:

Formalizing the ranking of authentication products

Kirsi Helkala (Norwegian Information Security Laboratory, Gjøvik University College, Gjøvik, Norway)
Einar Snekkenes (Norwegian Information Security Laboratory, Gjøvik University College, Gjøvik, Norway)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 20 March 2009

755

Abstract

Purpose

The purpose of this paper is to present a new method for ranking authentication products. Using this method, issues such as technical performance, application/system‐specific requirements, cost and usability are addressed. The method simplifies and makes the selection process more transparent by identifying issues that are important when selecting products.

Design/methodology/approach

The paper used quantitative cost and performance analysis.

Findings

The method can be widely applied, allowing the comparison and ranking of an extensive variety of authentication products (passwords, biometrics, tokens). The method can be used for both product selection and the process of product development as supported by the case studies.

Originality/value

This is a work that demonstrates how to compare authentication methods from different categories. A novel ranking method has been developed which allows the comparison of different authentication products in a defined usage scenario.

Keywords

Citation

Helkala, K. and Snekkenes, E. (2009), "Formalizing the ranking of authentication products", Information Management & Computer Security, Vol. 17 No. 1, pp. 30-43. https://doi.org/10.1108/09685220910944740

Publisher

:

Emerald Group Publishing Limited

Copyright © 2009, Emerald Group Publishing Limited

Related articles