Abstract
This publication provides a guideline to be used by Federal organizations in the selection and evaluation of techniques for automatically verifying the identity of individuals seeking access to computer systems and networks via terminals, where controlled acceddibility is required for security purposes. The guideline describes various techniques for verifying identity and provides a set criteria for the evaluation of automated identification systems embodying techniques.
Keywords
ADP security, computer networks, controlled accessibility, encryption, evaluation criteria, key, password, personal identification, terminals, verification