
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. As authentication becomes ever more ubiquitous, understanding its interplay with privacy is vital. The report examines numerous concepts, including authentication, authorization, identification, privacy, and security. It provides a framework to guide thinking about these issues when deciding whether and how to use authentication in a particular context. The book explains how privacy is affected by system design decisions. It also describes governments unique role in authentication and what this means for how government can use authentication with minimal invasions of privacy. In addition, Who Goes There? outlines usability and security considerations and provides a primer on privacy law and policy.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- COVER PAGE
- THE NATIONAL ACADEMIES
- COMMITTEE ON AUTHENTICATION TECHNOLOGIES AND THEIR PRIVACY IMPLICATIONS
- COMPUTER SCIENCE AND TELECOMMUNICATIONS BOARD
- Preface
- Acknowledgment of Reviewers
- Contents
- Executive Summary
- 1 Introduction and Overview
- 2 Authentication in the Abstract
- 3 Privacy Challenges in Authentication Systems
- 4 Security and Usability
- 5 Authentication Technologies
- 6 Authentication, Privacy, and the Roles of Government
- 7 A Toolkit for Privacy in the Context of Authentication
- APPENDIXES
- What Is CSTB?