Access controls ensure that all direct accesses to objects are authorized by means of user identification. However, in some scenarios it is also necessary to continuously check the identity of the user in order to avoid malicious behaviors such as person exchanges immediately after the initial authentication phase. Aim of this work is to propose a methodology based on a balanced mix of strong and weak authentication techniques studied to guarantee a high and prolonged in time level of security combining the advantages of each authenticator.
A fuzzy trust model proposal to ensure the identity of a user in time / A. Azzini, S. Marrara - In: Computational intelligence : theory and applications : international conference, 9. Fuzzy days in Dortmund, Germany : september 18-20, 2006 : proceedings / [a cura di] B. Reusch. - Berlin : Springer, 2006. - ISBN 9783540347804. - pp. 181-190 (( Intervento presentato al 9. convegno Fuzzy days tenutosi a Dortmund, Germany nel 2006.
A fuzzy trust model proposal to ensure the identity of a user in time
A. AzziniPrimo
;S. MarraraUltimo
2006
Abstract
Access controls ensure that all direct accesses to objects are authorized by means of user identification. However, in some scenarios it is also necessary to continuously check the identity of the user in order to avoid malicious behaviors such as person exchanges immediately after the initial authentication phase. Aim of this work is to propose a methodology based on a balanced mix of strong and weak authentication techniques studied to guarantee a high and prolonged in time level of security combining the advantages of each authenticator.File | Dimensione | Formato | |
---|---|---|---|
BiometricTrust-long.pdf
accesso aperto
Tipologia:
Pre-print (manoscritto inviato all'editore)
Dimensione
118.15 kB
Formato
Adobe PDF
|
118.15 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.