Active Authentication: The Panacea of Access Control