Intelligent authentication, authorization, and administration (I3A)
Information Management & Computer Security
ISSN: 0968-5227
Article publication date: 1 December 2005
Abstract
Purpose
This paper has the purpose of presenting intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between involved sides by agreement, rather than by over‐exercised enforcement.
Design/methodology/approach
To understand the needs and motivators for the concept, the areas of technology, policies, law, and human mindsets are discussed. The I3A is introduced by discussing two examples of possible solutions that would use the concept in e‐commerce.
Findings
In essence, I3A offers an open platform for enabling I3A of cryptographic keys, certificates, and privileges and integrating the use of such with secured applications on a wide variety of devices and environments. The paper argues that for the first time I3A creates a true public key infrastructure (TPKI) and leverages the benefits and the potential of existing and future PKI under one common unconstrained umbrella.
Originality/value
Focuses on a TPKI.
Keywords
Citation
Eigeles, D. (2005), "Intelligent authentication, authorization, and administration (I3A)", Information Management & Computer Security, Vol. 13 No. 5, pp. 419-434. https://doi.org/10.1108/09685220510627296
Publisher
:Emerald Group Publishing Limited
Copyright © 2005, Emerald Group Publishing Limited