Computer-based information systems in general, and Internet e-commerce and e-business systems in particular, employ many types of resources that need to be protected against access by unauthorized users. Three main components of access control are used in most information systems: identification, authentication, and authorization. In this paper we focus on authentication, which is the most problematic component. The three main approaches to user authentication are: knowledge-based, possession-based, and biometric-based. We review and compare the various authentication mechanisms of these approaches and the technology and implementation issues they involve. Our conclusion is that there is no silver bullet solution to user authentication problems. Authentication practices need improvement. Further research should lead to a better understanding of user behavior and the applied psychology aspects of computer security.
Zviran, Moshe and Erlich, Zippy
"Identification and Authentication: Technology and Implementation Issues,"
Communications of the Association for Information Systems: Vol. 17
, Article 4.
Available at: http://aisel.aisnet.org/cais/vol17/iss1/4