A Review of Identity, Identification & Authentication

Research output: Contribution to journalArticle

84 Downloads (Pure)

Abstract

With the continued increase in identity theft and related crime, the topics of Identity, Identification and authentication have become a salient focus for governments, institutions and federal crime units across the globe. A plethora of personal identifying details contribute to the formation of an ‘identity’. The construct of an individual’s identity is formed from a combination of attributes that may be genetic, assigned, acquired or socially based. Although the concept of ‘identity’ is somewhat intangible, the concept has morphed in something that is undeniably tangible through the use of identification documentation. Traditionally individuals and organisations depended on traditional paper documentation as a proof of identity, however, with technological advancements, this trend is fast becoming obsolete. Individuals are now required to prove their identity not only in the physical world but also in a cyber context. This review paper explores the areas of identity, identification and authentication, identifying the means by which individuals may be identified, including the modern technologies that are invoked to conduct the process. It also examines emerging technologies that may become standard methods utilized to authenticate purported identities.
Original languageEnglish
Article number561
Pages (from-to)794-804
Number of pages11
JournalInternational Journal for Information Security Research
Volume8
Issue number2
DOIs
Publication statusAccepted/In press - 28 Sep 2018

    Fingerprint

Keywords

  • Identity
  • identificacion
  • authentication
  • digital identity
  • digital footprint
  • identity access management
  • Access control
  • Information Security
  • e-identification
  • IDaaS
  • identity on the blockchain

Cite this