Towards Cross-Domain eID by Using Agile Mobile Authentication

T. Lenz, L. Alber

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Abstract

Identification and authentication are essential processes in various areas of applications. While these processes are widely described and examined in respect to Web applications that are used on personal computers, the situation is more demanding on smart or mobile devices, because these devices provides other interfaces and has a different user behavior. Additionally, the smart or mobile technology sector has a continuous enhancement that results in no stable technology over the years. Consequently, a new usable, agile, and secure method becomes necessary to bring identification and secure authentication on smart or mobile platforms. In this paper, we propose a new agile mobile authentication process that closes the gap between different devices and service type. This proposed authentication process uses already existing technologies for mobile or smart devices to use these devices for identification and authentication directly. We illustrate the practical applicability of our agile mobile authentication for cross-domain eID by implementing all needed components for the Austria eGovernment infrastructure. Finally, we evaluate the implemented components during a first pilot time of 4 months.
Original languageUndefined/Unknown
Title of host publication2017 IEEE Trustcom/BigDataSE/ICESS
Pages570-577
Number of pages8
DOIs
Publication statusPublished - 1 Aug 2017

Keywords

  • authorisation
  • government data processing
  • human computer interaction
  • Internet
  • mobile computing
  • smart phones
  • software prototyping
  • cross-domain eID
  • agile mobile authentication process
  • Web applications
  • personal computers
  • smart devices
  • mobile devices
  • user behavior
  • smart technology sector
  • mobile technology sector
  • secure authentication
  • Austria eGovernment infrastructure
  • Authentication
  • Mobile handsets
  • Mobile communication
  • Stakeholders
  • Interoperability
  • Microcomputers
  • Mobile
  • Agile
  • Secure
  • Usable
  • Smart

Cite this

Towards Cross-Domain eID by Using Agile Mobile Authentication. / Lenz, T.; Alber, L.

2017 IEEE Trustcom/BigDataSE/ICESS. 2017. p. 570-577.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Lenz, T. ; Alber, L. / Towards Cross-Domain eID by Using Agile Mobile Authentication. 2017 IEEE Trustcom/BigDataSE/ICESS. 2017. pp. 570-577
@inproceedings{fd43d60006ce491e8fe93be9c77f27c7,
title = "Towards Cross-Domain eID by Using Agile Mobile Authentication",
abstract = "Identification and authentication are essential processes in various areas of applications. While these processes are widely described and examined in respect to Web applications that are used on personal computers, the situation is more demanding on smart or mobile devices, because these devices provides other interfaces and has a different user behavior. Additionally, the smart or mobile technology sector has a continuous enhancement that results in no stable technology over the years. Consequently, a new usable, agile, and secure method becomes necessary to bring identification and secure authentication on smart or mobile platforms. In this paper, we propose a new agile mobile authentication process that closes the gap between different devices and service type. This proposed authentication process uses already existing technologies for mobile or smart devices to use these devices for identification and authentication directly. We illustrate the practical applicability of our agile mobile authentication for cross-domain eID by implementing all needed components for the Austria eGovernment infrastructure. Finally, we evaluate the implemented components during a first pilot time of 4 months.",
keywords = "authorisation, government data processing, human computer interaction, Internet, mobile computing, smart phones, software prototyping, cross-domain eID, agile mobile authentication process, Web applications, personal computers, smart devices, mobile devices, user behavior, smart technology sector, mobile technology sector, secure authentication, Austria eGovernment infrastructure, Authentication, Mobile handsets, Mobile communication, Stakeholders, Interoperability, Microcomputers, Mobile, Agile, Secure, Usable, Smart",
author = "T. Lenz and L. Alber",
year = "2017",
month = "8",
day = "1",
doi = "10.1109/Trustcom/BigDataSE/ICESS.2017.286",
language = "undefiniert/unbekannt",
pages = "570--577",
booktitle = "2017 IEEE Trustcom/BigDataSE/ICESS",

}

TY - GEN

T1 - Towards Cross-Domain eID by Using Agile Mobile Authentication

AU - Lenz, T.

AU - Alber, L.

PY - 2017/8/1

Y1 - 2017/8/1

N2 - Identification and authentication are essential processes in various areas of applications. While these processes are widely described and examined in respect to Web applications that are used on personal computers, the situation is more demanding on smart or mobile devices, because these devices provides other interfaces and has a different user behavior. Additionally, the smart or mobile technology sector has a continuous enhancement that results in no stable technology over the years. Consequently, a new usable, agile, and secure method becomes necessary to bring identification and secure authentication on smart or mobile platforms. In this paper, we propose a new agile mobile authentication process that closes the gap between different devices and service type. This proposed authentication process uses already existing technologies for mobile or smart devices to use these devices for identification and authentication directly. We illustrate the practical applicability of our agile mobile authentication for cross-domain eID by implementing all needed components for the Austria eGovernment infrastructure. Finally, we evaluate the implemented components during a first pilot time of 4 months.

AB - Identification and authentication are essential processes in various areas of applications. While these processes are widely described and examined in respect to Web applications that are used on personal computers, the situation is more demanding on smart or mobile devices, because these devices provides other interfaces and has a different user behavior. Additionally, the smart or mobile technology sector has a continuous enhancement that results in no stable technology over the years. Consequently, a new usable, agile, and secure method becomes necessary to bring identification and secure authentication on smart or mobile platforms. In this paper, we propose a new agile mobile authentication process that closes the gap between different devices and service type. This proposed authentication process uses already existing technologies for mobile or smart devices to use these devices for identification and authentication directly. We illustrate the practical applicability of our agile mobile authentication for cross-domain eID by implementing all needed components for the Austria eGovernment infrastructure. Finally, we evaluate the implemented components during a first pilot time of 4 months.

KW - authorisation

KW - government data processing

KW - human computer interaction

KW - Internet

KW - mobile computing

KW - smart phones

KW - software prototyping

KW - cross-domain eID

KW - agile mobile authentication process

KW - Web applications

KW - personal computers

KW - smart devices

KW - mobile devices

KW - user behavior

KW - smart technology sector

KW - mobile technology sector

KW - secure authentication

KW - Austria eGovernment infrastructure

KW - Authentication

KW - Mobile handsets

KW - Mobile communication

KW - Stakeholders

KW - Interoperability

KW - Microcomputers

KW - Mobile

KW - Agile

KW - Secure

KW - Usable

KW - Smart

U2 - 10.1109/Trustcom/BigDataSE/ICESS.2017.286

DO - 10.1109/Trustcom/BigDataSE/ICESS.2017.286

M3 - Beitrag in einem Konferenzband

SP - 570

EP - 577

BT - 2017 IEEE Trustcom/BigDataSE/ICESS

ER -