Authentication needs: conclusion
Future access controls must
- be appropriate, robust, flexible, scaleable, simple: “user-proof”
- enforce control but maximise access
- enact (indirect) contractual relationships
- reflect new inter-organisational world
- avoid current fragmentation
- embody needs of all ‘stakeholders’
-
-