A literature survey on authentication using Behavioural biometric techniques

R Oak - … and Information and Communication: Proceedings of …, 2018 - Springer
With technological advancements and the increasing use of computers and internet in our
day to day lives, the issue of security has become paramount. The rate of cybercrime has …

Unobtrusive interaction: a systematic literature review and expert survey

TCK Kwok, P Kiefer, M Raubal - Human–Computer Interaction, 2024 - Taylor & Francis
Unobtrusiveness has been highlighted as an important design principle in Human-
Computer Interaction (HCI). However, the understanding of unobtrusiveness in the literature …

A novel architecture for continuous authentication using behavioural biometrics

R Oak, M Khare - … International Conference on Current Trends in …, 2017 - ieeexplore.ieee.org
With technological advancements and the increasing use of computers and internet in our
day to day lives, the issue of security has become paramount. The rate of cybercrime has …

A Clark-Wilson and ANSI role-based access control model

T Tsegaye, S Flowerday - Information & Computer Security, 2020 - emerald.com
Purpose An electronic health record (EHR) enables clinicians to access and share patient
information electronically and has the ultimate goal of improving the delivery of healthcare …

A distributed authentication model for composite Web services

H Nacer, N Djebari, H Slimani, D Aissani - Computers & Security, 2017 - Elsevier
Proliferation of Web services based applications, collaboration and interoperability between
companies, extremely heterogeneous policies of security, and, more generally, reply attacks …

Expanding continuous authentication with mobile devices

KB Schaffer - Computer, 2015 - ieeexplore.ieee.org
Expanding Continuous Authentication with Mobile Devices Page 1 92 COMPUTER PUBLISHED
BY THE IEEE COMPUTER SOCIETY 0018-9162/15/$31.00 © 2015 IEEE SECURITY In our …

Logout in single sign-on systems: Problems and solutions

S Suoranta, K Manzoor, A Tontti, J Ruuskanen… - Journal of information …, 2014 - Elsevier
Web single sign-on (SSO) systems enable users to authenticate themselves to multiple
online services with one authentication credential and mechanism offered by an identity …

Authentication systems for securing clinical documentation workflows

J Schwartze, B Haarbrandt, D Fortmeier… - … of information in …, 2014 - thieme-connect.com
Context: Integration of electronic signatures embedded in health care processes in Germany
challenges health care service and supply facilities. The suitability of the signature level of …

Sliding mode observer for switched linear systems

D Gómez-Gutiérrez, S Čelikovský… - 2011 IEEE …, 2011 - ieeexplore.ieee.org
This work is concerned with the design of an observer for Switched Linear Systems (SLS)
subject to an unknown switching signal. The convergence of the proposed SLS observer is …

Logout in single sign-on systems

S Suoranta, A Tontti, J Ruuskanen, T Aura - … 2013, London, UK, April 8-9 …, 2013 - Springer
Single sign-on (SSO) helps users to cope with many online services that require
authentication. Systems such as OpenID and SAML-based Shibboleth offer federated …