To read this content please select one of the options below:

Intelligent authentication, authorization, and administration (I3A)

Dan Eigeles (Kiryat Ata, Israel)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 December 2005

1099

Abstract

Purpose

This paper has the purpose of presenting intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between involved sides by agreement, rather than by over‐exercised enforcement.

Design/methodology/approach

To understand the needs and motivators for the concept, the areas of technology, policies, law, and human mindsets are discussed. The I3A is introduced by discussing two examples of possible solutions that would use the concept in e‐commerce.

Findings

In essence, I3A offers an open platform for enabling I3A of cryptographic keys, certificates, and privileges and integrating the use of such with secured applications on a wide variety of devices and environments. The paper argues that for the first time I3A creates a true public key infrastructure (TPKI) and leverages the benefits and the potential of existing and future PKI under one common unconstrained umbrella.

Originality/value

Focuses on a TPKI.

Keywords

Citation

Eigeles, D. (2005), "Intelligent authentication, authorization, and administration (I3A)", Information Management & Computer Security, Vol. 13 No. 5, pp. 419-434. https://doi.org/10.1108/09685220510627296

Publisher

:

Emerald Group Publishing Limited

Copyright © 2005, Emerald Group Publishing Limited

Related articles