Konferenzpaper
Autorenliste: Dehling, F.; Kawelke, S.; Lo Iacono, L.
Erschienen in: Applied Cryptography and Network Security
Herausgeberliste: Fischlin, M.; Moonsamy, V.
Jahr der Veröffentlichung: 2015
Seiten: 110-136
ISBN: 978-3-031-95766-6
eISBN: 978-3-031-95767-3
DOI Link: https://doi.org/10.1007/978-3-031-95767-3_5
Konferenz: 23rd International Conference on Applied Cryptography and Network Security
Serientitel: Lecture Notes in Computer Science
Serienzählung: 15827
Continuous authentication (CAuthN) of users extends conventional authentication methods to ensure that only authorized individuals can access resources such as devices or applications while using authenticated sessions. Current research on CAuthN focuses mainly on the extraction of meaningful biometric features and the development of suitable evaluation algorithms. In comparison, systemic aspects that must be equally present for the effective use of CAuthN, such as deployment scenarios and attacker models, have only been insufficiently investigated and appear fragmented in the literature. We conduct a systematic review of the existing CAuthN literature to analyze the body of knowledge concerning scenarios in which CAuthN systems are deployed, the types of attacks they protect against, the integration of CAuthN components into existing IT systems, and their response to detected attacks. We uncover numerous shortcomings and inconsistencies, discuss them, and translate them into research questions that must be addressed before CAuthN systems can be established successfully in practice.
Abstract:
Zitierstile
Harvard-Zitierstil: Dehling, F., Kawelke, S. and Lo Iacono, L. (2015) SoK: Continuous Authentication Beyond Error Rates: Reviewing General System Properties, in Fischlin, M. and Moonsamy, V. (eds.) Applied Cryptography and Network Security. Cham: Springer. pp. 110-136. https://doi.org/10.1007/978-3-031-95767-3_5
APA-Zitierstil: Dehling, F., Kawelke, S., & Lo Iacono, L. (2015). SoK: Continuous Authentication Beyond Error Rates: Reviewing General System Properties. In Fischlin, M., & Moonsamy, V. (Eds.), Applied Cryptography and Network Security. (pp. 110-136). Springer. https://doi.org/10.1007/978-3-031-95767-3_5