Conference paper
Authors list: Dehling, F.; Kawelke, S.; Lo Iacono, L.
Appeared in: Applied Cryptography and Network Security
Editor list: Fischlin, M.; Moonsamy, V.
Publication year: 2015
Pages: 110-136
ISBN: 978-3-031-95766-6
eISBN: 978-3-031-95767-3
DOI Link: https://doi.org/10.1007/978-3-031-95767-3_5
Conference: 23rd International Conference on Applied Cryptography and Network Security
Title of series: Lecture Notes in Computer Science
Number in series: 15827
Continuous authentication (CAuthN) of users extends conventional authentication methods to ensure that only authorized individuals can access resources such as devices or applications while using authenticated sessions. Current research on CAuthN focuses mainly on the extraction of meaningful biometric features and the development of suitable evaluation algorithms. In comparison, systemic aspects that must be equally present for the effective use of CAuthN, such as deployment scenarios and attacker models, have only been insufficiently investigated and appear fragmented in the literature. We conduct a systematic review of the existing CAuthN literature to analyze the body of knowledge concerning scenarios in which CAuthN systems are deployed, the types of attacks they protect against, the integration of CAuthN components into existing IT systems, and their response to detected attacks. We uncover numerous shortcomings and inconsistencies, discuss them, and translate them into research questions that must be addressed before CAuthN systems can be established successfully in practice.
Abstract:
Citation Styles
Harvard Citation style: Dehling, F., Kawelke, S. and Lo Iacono, L. (2015) SoK: Continuous Authentication Beyond Error Rates: Reviewing General System Properties, in Fischlin, M. and Moonsamy, V. (eds.) Applied Cryptography and Network Security. Cham: Springer. pp. 110-136. https://doi.org/10.1007/978-3-031-95767-3_5
APA Citation style: Dehling, F., Kawelke, S., & Lo Iacono, L. (2015). SoK: Continuous Authentication Beyond Error Rates: Reviewing General System Properties. In Fischlin, M., & Moonsamy, V. (Eds.), Applied Cryptography and Network Security. (pp. 110-136). Springer. https://doi.org/10.1007/978-3-031-95767-3_5