Communications of the Association for Information Systems Volume 17 Article 4 January 2006 Identification and Authentication: Technology and Implementation Issues Moshe Zviran Tel Aviv University,
[email protected] Zippy Erlich The Open University of Israel Follow this and additional works at: https://aisel.aisnet.org/cais Recommended Citation Zviran, Moshe and Erlich, Zippy (2006) "Identification and Authentication: Technology and Implementation Issues," Communications of the Association for Information Systems: Vol. 17 , Article 4. DOI: 10.17705/1CAIS.01704 Available at: https://aisel.aisnet.org/cais/vol17/iss1/4 This material is brought to you by the AIS Journals at AIS Electronic Library (AISeL). It has been accepted for inclusion in Communications of the Association for Information Systems by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact
[email protected]. Communications of Association for Information Systems (Volume 17 2006) 90-105 90 IDENTIFICATION AND AUTHENTICATION: TECHNOLOGY AND IMPLEMENTATION ISSUES Moshe Zviran Tel Aviv University
[email protected] Zippy Erlich The Open University of Israel ABSTRACT Computer-based information systems in general, and Internet e-commerce and e-business systems in particular, employ many types of resources that need to be protected against access by unauthorized users. Three main components of access control are used in most information systems: identification, authentication, and authorization. In this paper we focus on authentication, which is the most problematic component. The three main approaches to user authentication are: knowledge-based, possession-based, and biometric-based. We review and compare the various authentication mechanisms of these approaches and the technology and implementation issues they involve.