Pursuing authentication through appropriate mechanisms for e-government procedures is a complex issue. The problem is not a technological one: from this point of view, the set of available authentication devices may be considered mature and stable. Major difficulties seem to arise from the fluidity of juridical taxonomies and of guiding-principles on which methodologies to select appropriate authentication mechanisms have to be established. Besides, e-inclusive policies and regulations have largely multiplied the number of variables to manage. In this scenario, effectiveness of available approaches and methodologies to support public bodies in their authentication choices may be legitimately questioned. © 2008 Physica-Verlag Heidelberg.
CITATION STYLE
Agostini, P. L., & Naggi, R. (2008). Selecting proper authentication mechanisms in electronic identity management (EIDM): Open issues. In Interdisciplinary Aspects of Information Systems Studies: The Italian Association for Information Systems (pp. 391–397). Physica-Verlag HD. https://doi.org/10.1007/978-3-7908-2010-2_48
Mendeley helps you to discover research relevant for your work.