Mapping security services to authentication levels

This report reviews the authentication levels and their mapping to public electronic services in the eGovernment programme framework, which require an authentication of the user (security services). It gives a general overview of European efforts and particularly the activities of STORK (Secure idenTity acrOss boRders linKed) in relation to the levels and the mapping. Essential concepts in IT security are explained and the mappings are illustrated by everyday life examples.

Published
March 08, 2011
Authors
Sławomir Górniak - ENISA, Stephan Körting - HJP Consulting, Diana Ombelli – HJP Consulting, Rodica Tirtea - ENISA, Demosthenes Ikonomou - ENISA
Language
English

We use cookies to ensure we give you the best browsing experience on our website. Find out more on how we use cookies and how you can change your settings.

Ok, I understand No, tell me more