What is it about?
Individuals have at least one identity. Likewise computers or an IT system can have several identities. Computer security presupposes these various identities can be fully managed - a mistake, of course. This paper explores how the gap between a person's identity and a machine's identity might be bridged.
Featured Image
Why is it important?
This problem cannot be solved because the modes of identity are inherently problematic.
Perspectives
Read the Original
This page is a summary of: Computer security and user authentication - Old problems, new solutions, December 1986, American Institute of Aeronautics and Astronautics (AIAA),
DOI: 10.2514/6.1986-2760.
You can read the full text:
Contributors
The following have contributed to this page