What is it about?

Individuals have at least one identity. Likewise computers or an IT system can have several identities. Computer security presupposes these various identities can be fully managed - a mistake, of course. This paper explores how the gap between a person's identity and a machine's identity might be bridged.

Featured Image

Why is it important?

This problem cannot be solved because the modes of identity are inherently problematic.

Perspectives

Security systems must not be designed on the assumption that identity can be securely established. Rather they should be built cope with that 'failing'.

Professor J. -C. Spender
Akademia Leona Kozminskiego

Read the Original

This page is a summary of: Computer security and user authentication - Old problems, new solutions, December 1986, American Institute of Aeronautics and Astronautics (AIAA),
DOI: 10.2514/6.1986-2760.
You can read the full text:

Read

Contributors

The following have contributed to this page