Mapping security services to authentication levels

This report reviews the authentication levels and their mapping to public electronic services in the eGovernment programme framework, which require an authentication of the user (security services). It gives a general overview of European efforts and particularly the activities of STORK (Secure idenTity acrOss boRders linKed) in relation to the levels and the mapping. Essential concepts in IT security are explained and the mappings are illustrated by everyday life examples.

Published
March 08, 2011
Authors
Sławomir Górniak - ENISA, Stephan Körting - HJP Consulting, Diana Ombelli – HJP Consulting, Rodica Tirtea - ENISA, Demosthenes Ikonomou - ENISA
Language
English

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information