1.

Record Nr.

UNINA9910697303003321

Titolo

A framework for multi-mode authentication [[electronic resource] ] : overview and implementation guide / / Wayne Jansen ... [and others]

Pubbl/distr/stampa

Gaithersburg, Md. : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2003]

Descrizione fisica

iii, 30 pages : digital, PDF file

Collana

NISTIR ; ; 7046

Altri autori (Persone)

JansenWayne A

Soggetti

Computer networks - Security measures

Pocket computers - Access control

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Title from page [1], viewed March 16, 2007.

"August 2003."

Sommario/riassunto

"The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for the mobile workforce. While these devices provide productivity benefits, they also pose new risks to an organization's security. Enabling adequate user authentication is the first line of defense against unauthorized use of a lost or stolen handheld device. Multiple modes of authentication increase the work factor needed to attack a device, however, few devices support more than one mode, usually password-based authentication. This report describes a general Multi-mode Authentication Framework (MAF) for applying organizational security policies, organized into distinct policy contexts known as echelons, among which a user may transition. The approach is aimed at helping users easily comply with their organization's security policy, yet be able to exercise a significant amount of flexibility and discretion. The design of the framework allows various types of authentication technologies to be incorporated readily and provides a simple interface for supporting different types of policy enforcement mechanisms. Details of the implementation of the framework are provided, as well as two example



authentication mechanisms."