Mapping security services to authentication levels
This report reviews the authentication levels and their mapping to public electronic services in the eGovernment programme framework, which require an authentication of the user (security services). It gives a general overview of European efforts and particularly the activities of STORK (Secure idenTity acrOss boRders linKed) in relation to the levels and the mapping. Essential concepts in IT security are explained and the mappings are illustrated by everyday life examples.
- Published
- Authors
- Sławomir Górniak - ENISA, Stephan Körting - HJP Consulting, Diana Ombelli – HJP Consulting, Rodica Tirtea - ENISA, Demosthenes Ikonomou - ENISA
- Language