A Review of Identity, Identification & Authentication

Juanita Blue, Joan Condell, Tom Lunney

Research output: Contribution to journalArticle

Abstract

With the continued increase in identity theft and related crime, the topics of Identity, Identification and authentication have become a salient focus for governments, institutions and federal crime units across the globe. A plethora of personal identifying details contribute to the formation of an ‘identity’. The construct of an individual’s identity is formed from a combination of attributes that may be genetic, assigned, acquired or socially based. Although the concept of ‘identity’ is somewhat intangible, the concept has morphed in something that is undeniably tangible through the use of identification documentation. Traditionally individuals and organisations depended on traditional paper documentation as a proof of identity, however, with technological advancements, this trend is fast becoming obsolete. Individuals are now required to prove their identity not only in the physical world but also in a cyber context. This review paper explores the areas of identity, identification and authentication, identifying the means by which individuals may be identified, including the modern technologies that are invoked to conduct the process. It also examines emerging technologies that may become standard methods utilized to authenticate purported identities.
LanguageEnglish
Article number561
Pages794-804
Number of pages11
JournalInternational Journal for Information Security Research
Volume8
Issue number2
DOIs
Publication statusAccepted/In press - 28 Sep 2018

Fingerprint

Crime
Authentication

Keywords

  • Identity
  • identificacion
  • authentication
  • digital identity
  • digital footprint
  • identity access management
  • Access control
  • Information Security
  • e-identification
  • IDaaS
  • identity on the blockchain

Cite this

@article{a198da87040c47d6a6d52c19214c3dd7,
title = "A Review of Identity, Identification & Authentication",
abstract = "With the continued increase in identity theft and related crime, the topics of Identity, Identification and authentication have become a salient focus for governments, institutions and federal crime units across the globe. A plethora of personal identifying details contribute to the formation of an ‘identity’. The construct of an individual’s identity is formed from a combination of attributes that may be genetic, assigned, acquired or socially based. Although the concept of ‘identity’ is somewhat intangible, the concept has morphed in something that is undeniably tangible through the use of identification documentation. Traditionally individuals and organisations depended on traditional paper documentation as a proof of identity, however, with technological advancements, this trend is fast becoming obsolete. Individuals are now required to prove their identity not only in the physical world but also in a cyber context. This review paper explores the areas of identity, identification and authentication, identifying the means by which individuals may be identified, including the modern technologies that are invoked to conduct the process. It also examines emerging technologies that may become standard methods utilized to authenticate purported identities.",
keywords = "Identity, identificacion, authentication, digital identity, digital footprint, identity access management, Access control, Information Security, e-identification, IDaaS, identity on the blockchain",
author = "Juanita Blue and Joan Condell and Tom Lunney",
year = "2018",
month = "9",
day = "28",
doi = "10.20533/ijisr.2042.4639.2018.0091",
language = "English",
volume = "8",
pages = "794--804",
journal = "International Journal for Information Security Research",
issn = "2042-4639",
number = "2",

}

A Review of Identity, Identification & Authentication. / Blue, Juanita; Condell, Joan; Lunney, Tom.

In: International Journal for Information Security Research, Vol. 8, No. 2, 561, 28.09.2018, p. 794-804.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A Review of Identity, Identification & Authentication

AU - Blue, Juanita

AU - Condell, Joan

AU - Lunney, Tom

PY - 2018/9/28

Y1 - 2018/9/28

N2 - With the continued increase in identity theft and related crime, the topics of Identity, Identification and authentication have become a salient focus for governments, institutions and federal crime units across the globe. A plethora of personal identifying details contribute to the formation of an ‘identity’. The construct of an individual’s identity is formed from a combination of attributes that may be genetic, assigned, acquired or socially based. Although the concept of ‘identity’ is somewhat intangible, the concept has morphed in something that is undeniably tangible through the use of identification documentation. Traditionally individuals and organisations depended on traditional paper documentation as a proof of identity, however, with technological advancements, this trend is fast becoming obsolete. Individuals are now required to prove their identity not only in the physical world but also in a cyber context. This review paper explores the areas of identity, identification and authentication, identifying the means by which individuals may be identified, including the modern technologies that are invoked to conduct the process. It also examines emerging technologies that may become standard methods utilized to authenticate purported identities.

AB - With the continued increase in identity theft and related crime, the topics of Identity, Identification and authentication have become a salient focus for governments, institutions and federal crime units across the globe. A plethora of personal identifying details contribute to the formation of an ‘identity’. The construct of an individual’s identity is formed from a combination of attributes that may be genetic, assigned, acquired or socially based. Although the concept of ‘identity’ is somewhat intangible, the concept has morphed in something that is undeniably tangible through the use of identification documentation. Traditionally individuals and organisations depended on traditional paper documentation as a proof of identity, however, with technological advancements, this trend is fast becoming obsolete. Individuals are now required to prove their identity not only in the physical world but also in a cyber context. This review paper explores the areas of identity, identification and authentication, identifying the means by which individuals may be identified, including the modern technologies that are invoked to conduct the process. It also examines emerging technologies that may become standard methods utilized to authenticate purported identities.

KW - Identity

KW - identificacion

KW - authentication

KW - digital identity

KW - digital footprint

KW - identity access management

KW - Access control

KW - Information Security

KW - e-identification

KW - IDaaS

KW - identity on the blockchain

U2 - 10.20533/ijisr.2042.4639.2018.0091

DO - 10.20533/ijisr.2042.4639.2018.0091

M3 - Article

VL - 8

SP - 794

EP - 804

JO - International Journal for Information Security Research

T2 - International Journal for Information Security Research

JF - International Journal for Information Security Research

SN - 2042-4639

IS - 2

M1 - 561

ER -