Search results

1 – 4 of 4
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 January 2006

Dan Eigeles

Aims to present intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between involved sides by agreement…

1417

Abstract

Purpose

Aims to present intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between involved sides by agreement, rather than by over‐exercised enforcement. In order to understand the needs and motivators for the concept, seeks to discuss the areas of technology, policies, law, and human mindsets.

Design/methodology/approach

Discussing two examples of possible solutions that would use the concept in e‐commerce.

Findings

Offers an open platform for enabling I3A of cryptographic keys, certificates, and privileges and integrating the use of such with secured applications on a wide variety of devices and environments.

Originality/value

Probably the first real exposition of the new concept I3A.

Details

Information Management & Computer Security, vol. 14 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 December 2005

Dan Eigeles

This paper has the purpose of presenting intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between…

1100

Abstract

Purpose

This paper has the purpose of presenting intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between involved sides by agreement, rather than by over‐exercised enforcement.

Design/methodology/approach

To understand the needs and motivators for the concept, the areas of technology, policies, law, and human mindsets are discussed. The I3A is introduced by discussing two examples of possible solutions that would use the concept in e‐commerce.

Findings

In essence, I3A offers an open platform for enabling I3A of cryptographic keys, certificates, and privileges and integrating the use of such with secured applications on a wide variety of devices and environments. The paper argues that for the first time I3A creates a true public key infrastructure (TPKI) and leverages the benefits and the potential of existing and future PKI under one common unconstrained umbrella.

Originality/value

Focuses on a TPKI.

Details

Information Management & Computer Security, vol. 13 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 July 2003

Dan Eigeles

The current paper presents a structured method helping organizational facilitators to work efficiently with their clients. Through this method it is possible to motivate and…

3127

Abstract

The current paper presents a structured method helping organizational facilitators to work efficiently with their clients. Through this method it is possible to motivate and encourage top executive team efficiently to willingly generate true vision and mission and implement these in the organization for achieving both improved performance and harmony.

Details

Journal of European Industrial Training, vol. 27 no. 5
Type: Research Article
ISSN: 0309-0590

Keywords

Available. Content available
Article
Publication date: 1 October 2006

265

Abstract

Details

Information Management & Computer Security, vol. 14 no. 5
Type: Research Article
ISSN: 0968-5227

1 – 4 of 4
Per page
102050