Skip to main content

Find us on

facebook youtube flickr twitter itunes u logo

 

Past Programs  

mechael youtube

Keynote: Securing IT in Healthcare: Part III
Patty Mechael
mHealth Alliance
May 16, 2013

 nilsen youtube

Keynote: SITH3, Technology-Enabled Remote Monitoring and Support
Wendy Nilsen
National Institutes of Health (NIH)
May 17, 2013

sith3 panel1 youtube

Intersection of mHealth and Behavioral Health
SITH3 Workshop, Panel 1
May 17, 2013

 

Newsletter 

ists newsletter summer 2012

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu
HomeEvents >

E-authentication: Using Cryptography, Biometrics and Knowledge Based Authentication and Tokens

Donna Dodson, National Institute of Standards and Technology (NIST)
April 21, 2008

Abstract

Donna DodsonThe ability to determine the identity of an individual allows information systems to support security functions including authentication, access control, and auditing. The rigor used to establish and confirm the identity of an individual provides the foundation an information system can have for assuring that an individual is who he claims to be. The quality of all decisions based on an established identity is limited by the credentials used in the identity's authentication. This talk will explore the technical foundations that are used to support e-authentication. It will address the strength of different technologies (including cryptography, biometrics and knowledge based authentication) that can be used as credentials in authentication schemes. The talk will conclude with considerations for building a general authentication framework.

Bio

Donna Dodson is the Deputy Cyber Security Advisor/Deputy Division Chief of the Computer Security Division at the National Institute of Standards and Technology. She is currently working in the areas of authentication and cryptography. She is a co-author of FIPS 201, Personal Verification of Federal Employees and Contractors and NIST SP 800-63, Electronic Authentication Guideline. Donna has also managed programs including the Advanced Encryption Standard, key management, PKI, and security testing.

Last Updated: 4/21/10