Main Nav

Monday
Jun 27th, 2005
10:15 AM - 11:30 AM
Continental C Ballroom
Mountain Time
Before user credentials can be assigned and distributed, appropriate technology must be in place, business requirements must be assessed and met, policy must be established and published, and appropriate procedures must be devised. Target applications may have idiosyncratic security requirements that must be considered before the credentialing process is operational. Formal levels of assurance may need to be defined for the authentication system. This session presents an overview of this critical stage.
Speakers
Resources