analysis of and proposes potential solutions for this system. It first presents a system that
allows users to authenticate to services in a frictionless manner, ie, without the need to
perform any particular authentication-related actions. Based on this system model, the paper
analyses security problems and potential privacy threats imposed on users, leading to the
specification of a set of security and privacy requirements. These requirements can be used …