Mapping security services to authentication levels

This report reviews the authentication levels and their mapping to public electronic services in the eGovernment programme framework, which require an authentication of the user (security services). It gives a general overview of European efforts and particularly the activities of STORK (Secure idenTity acrOss boRders linKed) in relation to the levels and the mapping. Essential concepts in IT security are explained and the mappings are illustrated by everyday life examples.

Mar 08, 2011


Sławomir Górniak - ENISA
Stephan Körting - HJP Consulting
Diana Ombelli – HJP Consulting
Rodica Tirtea - ENISA
Demosthenes Ikonomou - ENISA

Downloads

PDF document icon mapping.pdf — PDF document, 1,362 kB (1,395,620 bytes)

English