Presentation Overview
Why access control is problematic for all electronic information ‘stakeholders’
Understanding different access needs
Criteria for authentication initiatives
Towards an authentication model
Authentication requirements summary
Previous slide
Next slide
Back to first slide
View graphic version