Management and use of ID credentials on NFC enabled phones: Use cases, challenges, technologies and standards

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the service boundary blurring between services on the device and services on the cloud there is an increasing amount of value put into services. Access to these services need to be controlled and potentially compartmentalised between work, home and play. The value of having strong identity credentials to prove identity to access these services is proportionally increasing. This paper will look at the different use cases, challenges in using strong ID credentials and technologies and standards that are currently available that can address some of these challenges. It will also look at the management requirements around these credentials especially when they represent a derived credential from an existing credential (e.g. existing IDI SmartCard). © Springer Fachmedien Wiesbaden 2012.

Cite

CITATION STYLE

APA

Hoyer, P. (2012). Management and use of ID credentials on NFC enabled phones: Use cases, challenges, technologies and standards. In ISSE 2012 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2012 Conference (pp. 161–170). https://doi.org/10.1007/978-3-658-00333-3_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free