Читать книгу The Internet of Medical Things (IoMT) - Группа авторов - Страница 39
2.2.1 Authentication
ОглавлениеAuthentication is the process of establishing trust in user identity. Certification assurance levels will be in accordance with the application and nature and sensitivity to the risk involved. An increasing number of cloud providers are reached using their previously certified standards and user support and administration applications and data. Also, a common two-factor authentication, in the form of strong authentication, is, for example, to be used as online banking. In theory, it should be protected using strong authentication networks. The stricter requirements apply mainly to CSP employees. They also have access to IT resources; just for example, it will be provided through strong authentication, using a chip card or USB stick that can be generated by hardware through hardware-based password authentication system or media. This is really necessary to use on the Internet. He went on to establish strict procedures that are the basis of all relationships of trust between participants for relationships between two actors. After the trust relationship is established through a series of trusted from a certification authority, participants can be used to authenticate each other in connection with [3]. There are a variety of authentication methods and techniques that organizations can choose as follows.