×
Abstract: We envisage a fine-grained access control solution that allows a user's access privilege to be linked to the assurance level in identifying the user.
This paper investigates the feasibility of estimating a user's LoA at run-time by designing and evaluating an authentication algorithm that derives a LoA value, ...
We envisage a fine-grained access control solution that allows a user's access privilege to be linked to the assurance level in identifying the user.
People also ask
Assurance levels depend on the strength of the Identity proofing process and the types of credentials and authentication mechanisms used during a transaction.
Missing: Quantifying grid
Authentication protocols where the verifier has data that can only be used to verify, and not generate, the authenticator output are referred to as bring ...
Nov 30, 2012 · The assurance level requirement determined in Step 1 is the minimum assurance level that an overall authentication solution should achieve.
- Li Yao and Ning Zhang, “Quantifying Authentication Levels of Assurance in Grid. Environments”, the 6th Information Assurance and Security Conference 2010.
The key to solve the above problems is the idea of “Measuring Assurance in Cyber Space”, where measures of merit and metrics to characterize quantitatively ...
Mar 30, 2024 · This paper presents a generic proposal for improving existing IdM systems, by enabling service providers to determine whether the SSO ...
Sep 5, 2020 · NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems ...