2014 IEEE 38th International Computer Software and Applications Conference Workshops 2014
DOI: 10.1109/compsacw.2014.34
|View full text |Cite
|
Sign up to set email alerts
|

Modeling the Cost Structure of Identity Proofing

Abstract: Identity Proofing -providing a digital identifier bound to a real-world entity -is effective against identity theft, which is a serious problem for cyber security. In-person interaction with an applicant is the basis of identity proofing, but that is only effective when all applicants are located near a registration authority (RA) which is responsible for verifying some or all of the applicant's identity information. Since that requirement can be hard to fulfill, especially in distributed organizations, the RA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
0
0
Order By: Relevance
“…Identity proofing is the process of verifying that the user is actually who is claimed to be [20]. This process is required to avoid any identity theft.…”
Section: B Identity Services-based Assessmentmentioning
confidence: 99%
“…Identity proofing is the process of verifying that the user is actually who is claimed to be [20]. This process is required to avoid any identity theft.…”
Section: B Identity Services-based Assessmentmentioning
confidence: 99%