Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
458262 | Information Security Technical Report | 2008 | 9 Pages |
Abstract
In this article we carry out a critical analysis of the benefits and drawbacks which are likely when we include electronic data to hold, validate and process the information used to generate and manage an identity. In addition, we consider the potential knock-on impact of this for the transactions which rely on this electronic identity information.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Geraint Price,