What is it about?
Individuals have at least one identity. Likewise computers or an IT system can have several identities. Computer security presupposes these various identities can be fully managed - a mistake, of course. This paper explores how the gap between a person's identity and a machine's identity might be bridged.
Featured Image
Why is it important?
This problem cannot be solved because the modes of identity are inherently problematic.
Perspectives
Security systems must not be designed on the assumption that identity can be securely established. Rather they should be built cope with that 'failing'.
Professor J. -C. Spender
Akademia Leona Kozminskiego
Read the Original
This page is a summary of: Computer security and user authentication - Old problems, new solutions, December 1986, American Institute of Aeronautics and Astronautics (AIAA),
DOI: 10.2514/6.1986-2760.
You can read the full text:
Contributors
The following have contributed to this page