Formalizing the ranking of authentication products
Abstract
Purpose
The purpose of this paper is to present a new method for ranking authentication products. Using this method, issues such as technical performance, application/system‐specific requirements, cost and usability are addressed. The method simplifies and makes the selection process more transparent by identifying issues that are important when selecting products.
Design/methodology/approach
The paper used quantitative cost and performance analysis.
Findings
The method can be widely applied, allowing the comparison and ranking of an extensive variety of authentication products (passwords, biometrics, tokens). The method can be used for both product selection and the process of product development as supported by the case studies.
Originality/value
This is a work that demonstrates how to compare authentication methods from different categories. A novel ranking method has been developed which allows the comparison of different authentication products in a defined usage scenario.
Keywords
Citation
Helkala, K. and Snekkenes, E. (2009), "Formalizing the ranking of authentication products", Information Management & Computer Security, Vol. 17 No. 1, pp. 30-43. https://doi.org/10.1108/09685220910944740
Publisher
:Emerald Group Publishing Limited
Copyright © 2009, Emerald Group Publishing Limited