With the service boundary blurring between services on the device and services on the cloud there is an increasing amount of value put into services. Access to these services need to be controlled and potentially compartmentalised between work, home and play. The value of having strong identity credentials to prove identity to access these services is proportionally increasing. This paper will look at the different use cases, challenges in using strong ID credentials and technologies and standards that are currently available that can address some of these challenges. It will also look at the management requirements around these credentials especially when they represent a derived credential from an existing credential (e.g. existing IDI SmartCard). © Springer Fachmedien Wiesbaden 2012.
CITATION STYLE
Hoyer, P. (2012). Management and use of ID credentials on NFC enabled phones: Use cases, challenges, technologies and standards. In ISSE 2012 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2012 Conference (pp. 161–170). https://doi.org/10.1007/978-3-658-00333-3_16
Mendeley helps you to discover research relevant for your work.