作者
Khairul Azmi Abu Bakar, Galoh Rashidah Haron
发表日期
2013/6/22
来源
2013 World Congress on Computer and Information Technology (WCCIT)
页码范围
1-6
出版商
IEEE
简介
Authentication is a mechanism to establish proof of identities. Common practise for authentication is to challenge user to present authentication credential. User who can present the valid credential is considered as authenticated identity. Traditional authentication systems have a static security requirement which does not consider the change of user behavior or environment. In contrast, adaptive authentication systems are risk-based authentication that consider those changes to identify high-risk and suspicious illegitimate login attempts. In this paper, we examine some of the adaptive authentication systems that have been proposed recently in the literature. Some of the issues and challenges when developing an adaptive authentication system are also discussed. We also introduce our own Unified Authentication Platform (UAP) which incorporates adaptive control. We describe two typical processes that are used …
引用总数
2013201420152016201720182019202020212022202311312122543
学术搜索中的文章
KAA Bakar, GR Haron - 2013 World Congress on Computer and Information …, 2013