Access controls ensure that all direct accesses to objects are authorized by means of user identification. However, in some scenarios it is also necessary to continuously check the identity of the user in order to avoid malicious behaviors such as person exchanges immediately after the initial authentication phase. Aim of this work is to propose a methodology based on a balanced mix of strong and weak authentication techniques studied to guarantee a high and prolonged in time level of security combining the advantages of each authenticator.

A fuzzy trust model proposal to ensure the identity of a user in time / A. Azzini, S. Marrara - In: Computational intelligence : theory and applications : international conference, 9. Fuzzy days in Dortmund, Germany : september 18-20, 2006 : proceedings / [a cura di] B. Reusch. - Berlin : Springer, 2006. - ISBN 9783540347804. - pp. 181-190 (( Intervento presentato al 9. convegno Fuzzy days tenutosi a Dortmund, Germany nel 2006.

A fuzzy trust model proposal to ensure the identity of a user in time

A. Azzini
Primo
;
S. Marrara
Ultimo
2006

Abstract

Access controls ensure that all direct accesses to objects are authorized by means of user identification. However, in some scenarios it is also necessary to continuously check the identity of the user in order to avoid malicious behaviors such as person exchanges immediately after the initial authentication phase. Aim of this work is to propose a methodology based on a balanced mix of strong and weak authentication techniques studied to guarantee a high and prolonged in time level of security combining the advantages of each authenticator.
File in questo prodotto:
File Dimensione Formato  
BiometricTrust-long.pdf

accesso aperto

Tipologia: Pre-print (manoscritto inviato all'editore)
Dimensione 118.15 kB
Formato Adobe PDF
118.15 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

Caricamento pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: http://hdl.handle.net/2434/49640
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact