Search results

1 – 1 of 1
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 December 2005

Oleksiy Mazhelis, Jouni Markkula and Jari Veijalainen

To report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and…

1130

Abstract

Purpose

To report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐friendliness.

Design/methodology/approach

The reported research corresponds to the building process in the design science research paradigm. The requirements to an identity verification system are defined and used in the selection of architecture components. Furthermore, various issues affecting the suitability of component distribution between a terminal and a remote server are considered.

Findings

In order to meet the stated requirements, in the proposed architecture static and dynamic identity verification is combined. The use of the dynamic part enables continuous and user‐friendly verification, while the static part is responsible for accurate verification. A suitable distribution of architecture components between the terminal and the remote server is proposed.

Research limitations/implications

The proposed architecture represents a specification that corresponds to the computational viewpoint of the reference model for open distributed processing. Other specifications, such as engineering or technological specifications, which are needed for successful implementation of the system, are not provided in the paper.

Practical implications

The paper provides a specification of the integrated identify verification system architecture that can be utilised during further design and subsequent implementation of the system.

Originality/value

While available approaches to identity verification in a mobile environment concentrate mainly on connectivity identity verification (employed in accessing communication services), the proposed architecture focuses on application‐level identity verification needed to access application‐level resources, remotely or locally on the terminal.

Details

Information Management & Computer Security, vol. 13 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 1 of 1
Per page
102050