Traditional authentication
Slide 3 of 14
Go to slide:
1: Security and authentication issues - where are we heading?
2: The context
3: Traditional authentication
4: IP address checking
5: Access control via passwords
6: National strategy: Athens
7: Athens: current limitations
8: National strategy: Sparta
9: Sparta (continued)
10: Bluestem: a possible model
11: The longer-term future
12: Digital certificates: pros
13: Digital certificates: cons
14: Conclusions