A Fuzzy Trust Model Proposal to Ensure the Identity of a User in Time
暂无分享,去创建一个
Access controls ensure that all direct accesses to objects are authorized by means of user identification. However, in some scenarios it is also necessary to continuously check the identity of the user in order to avoid malicious behaviors such as person exchanges immediately after the initial authentication phase. Aim of this work is to propose a methodology based on a balanced mix of strong and weak authentication techniques studied to guarantee a high and prolonged in time level of security combining the advantages of each authenticator.
[1] S. Liu,et al. A practical guide to biometric security technology , 2001 .
[2] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[3] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[4] Václav Matyás,et al. Toward Reliable User Authentication through Biometrics , 2003, IEEE Secur. Priv..