A survey on adaptive authentication

P Arias-Cabarcos, C Krupitzer, C Becker - ACM Computing Surveys …, 2019 - dl.acm.org
Adaptive Authentication allows a system to dynamically select the best mechanism (s) for
authenticating a user depending on contextual factors, such as location, proximity to …

[HTML][HTML] An approach to detect user behaviour anomalies within identity federations

AG Martín, M Beltrán, A Fernández-Isabel… - computers & …, 2021 - Elsevier
Abstract User and Entity Behaviour Analytics (UEBA) mechanisms rely on statistical
techniques and Machine Learning to determine when a significant deviation from patterns or …

Design of a risk based authentication system using machine learning techniques

M Misbahuddin, BS Bindhumadhava… - … , Advanced & Trusted …, 2017 - ieeexplore.ieee.org
Authentication provides a means to verify the legitimacy of a user trying to access any
confidential or sensitive information. The need for protecting secure data hosted on the web …

Adaptive authentication: Implementing random canvas fingerprinting as user attributes factor

NI Daud, GR Haron, SSS Othman - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Previously, canvas fingerprinting can be used as one of the ways to get to know the identity
of cyber users. The value contained in fingerprint for each of the users is different. However …

Engineering adaptive authentication

A Hassan, B Nuseibeh… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Adaptive authentication systems identify and enforce suitable methods to verify that
someone (user) or something (device) is eligible to access a service or a resource. An …

Zero Trust-Based Adaptive Authentication using Composite Attribute Set

V Krishnan, CS Sreeja - 2021 IEEE 3rd PhD Colloquium on …, 2021 - ieeexplore.ieee.org
Rapid evolution of internet-oriented applications has increased the threats to confidential
data. Single-factor authentication approaches are no longer sufficient to ensure user …

Web Application Based Authentication System

SV Akram, SK Joshi, R Deorari - … Humanitarian Conference for …, 2022 - ieeexplore.ieee.org
Authentication is one of the primary problems with system security. The key component of
the access control process to prevent unauthorised users from accessing data and …

Adaptive, Multi-Factor Authentication as a Service for Web Applications

D Morais, A Zúquete, A Mendes - 2023 7th Cyber Security in …, 2023 - ieeexplore.ieee.org
With the recent growth of Internet of Things (IoT), cloud platforms and, consequently, the
exponential increase in online exchanges encompassing sensitive information pertinent to …

A json web signature based adaptive authentication modality for healthcare applications

V Krishnan, CS Sreeja, S Binu… - … Conference on Public …, 2022 - ieeexplore.ieee.org
In the era of fast internet-centric systems, the importance of security cannot be stressed
more. However, stringent and multiple layers of security measures tend to be a hindrance to …

Customer identification verification process

J Phillips, Z Liu, C Bousquet - US Patent 11,120,448, 2021 - Google Patents
An example device may include one or more processors to receive a request for a service
from a requestor user device; provide transaction information associated with the service to …