Migrating to zero trust architecture: Reviews and challenges

S Teerakanok, T Uehara… - Security and …, 2021 - Wiley Online Library
Zero trust (ZT) is a new concept involving the provisioning of enterprise/organization
resources to the subjects without relying on any implicit trust. Unlike the perimeter‐based …

Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones

H Xu, Y Zhou, MR Lyu - 10th Symposium On Usable Privacy and …, 2014 - usenix.org
Current smartphones generally cannot continuously authenticate users during runtime. This
poses severe security and privacy threats: A malicious user can manipulate the phone if …

A review of continuous authentication using behavioral biometrics

IC Stylios, O Thanou, I Androulidakis… - Proceedings of the …, 2016 - dl.acm.org
The present study carries out a literature review on the topic of Continuous Authentication
(CA) using behavioral biometrics. CA systems have been proposed in order to solve the …

A survey for user behavior analysis based on machine learning techniques: current models and applications

A G. Martín, A Fernández-Isabel, I Martín de Diego… - Applied …, 2021 - Springer
Significant research has been carried out in the field of User Behavior Analysis, focused on
understanding, modeling and predicting past, present and future behaviors of users …

Dynamic access control and authorization system based on zero-trust architecture

Q Yao, Q Wang, X Zhang, J Fei - … of the 2020 1st international conference …, 2020 - dl.acm.org
With the development of cloud computing, artificial intelligence, big data and other
technologies, network systems are facing more and more security risks and threats. The …

A survey on different continuous authentication systems

S Ayeswarya, J Norman - International Journal of Biometrics, 2019 - inderscienceonline.com
There has been significant research in the provision of trustworthy initial login user
authentication, however, there is still need for continuous authentication during a user …

[图书][B] Cloud computing in remote sensing

L Wang, J Yan, Y Ma - 2019 - taylorfrancis.com
This book provides the users with quick and easy data acquisition, processing, storage and
product generation services. It describes the entire life cycle of remote sensing data and …

[PDF][PDF] Context-aware authentication for the internet of things

K Habib, W Leister - Elev. Int. Conf. Auton. Auton. Syst. fined, 2015 - academia.edu
Many traditional authentication and access control mechanisms do not use context-aware
approach, ie, those mechanisms do not incorporate context parameters while making …

[PDF][PDF] A biometric approach for continuous user authentication by fusing hard and soft traits.

A Prakash, R Mukesh - Int. J. Netw. Secur., 2014 - ijns.jalaxy.com.tw
Most existing computer and network systems authenticate a user only at the initial login
session. This could be a critical security weakness, especially for high-security systems …

MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android

J Chen, U Hengartner, H Khan - ACM Transactions on Privacy and …, 2024 - dl.acm.org
Adaptive authentication enables smartphones and enterprise apps to decide when and how
to authenticate users based on contextual and behavioral factors. In practice, a system may …