메뉴 건너뛰기




Volumn 19, Issue 5, 2007, Pages 695-710

Bayesian networks for knowledge-based authentication

Author keywords

Bayesian networks; Entropy; Information theory; Knowledge based authentication; Metrics; Security; Simulation

Indexed keywords

ELECTRONIC TRANSACTIONS; KNOWLEDGE-BASED AUTHENTICATION; PROBABILISTIC REASONING; USER AUTHENTICATION;

EID: 33947623081     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2007.1024     Document Type: Article
Times cited : (17)

References (58)
  • 3
    • 33947614547 scopus 로고    scopus 로고
    • K. Cartwright, Information Sources and Metrics, Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
    • K. Cartwright, "Information Sources and Metrics," Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
  • 4
    • 33947651500 scopus 로고    scopus 로고
    • Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, 107th US Congress, First Session, HR 3162 Public Law 107-45, Oct. 2001.
    • Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, 107th US Congress, First Session, HR 3162 Public Law 107-45, Oct. 2001.
  • 5
    • 33947669259 scopus 로고    scopus 로고
    • S. Howard, Knowledge Based Authentication and Privacy: Can Standards Help, Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
    • S. Howard, "Knowledge Based Authentication and Privacy: Can Standards Help," Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
  • 7
    • 33947691113 scopus 로고    scopus 로고
    • S. Chokhani, Knowledge Based Authentication (KBA) Metrics, Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
    • S. Chokhani, "Knowledge Based Authentication (KBA) Metrics," Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
  • 8
    • 33947704016 scopus 로고    scopus 로고
    • B. Lawler, Models of Knowledge Based Authentication (KBA), Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
    • B. Lawler, "Models of Knowledge Based Authentication (KBA)," Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
  • 9
    • 0043232732 scopus 로고    scopus 로고
    • Users Are Not the Enemy
    • A. Adams and M.A. Sasse, "Users Are Not the Enemy," Comm. ACM, vol. 42, no. 12, pp. 40-46, 1999.
    • (1999) Comm. ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 10
    • 33947626972 scopus 로고    scopus 로고
    • K. Trilli and B. Andrews, KBA Challenge Response System, Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
    • K. Trilli and B. Andrews, "KBA Challenge Response System," Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
  • 11
    • 33947702984 scopus 로고    scopus 로고
    • Entrust IdentityGuard - User Authentication Methods, Entrust, May 2006, http://www.entrust.com/strong-authentication/user-authentication/ methods.htm.
    • "Entrust IdentityGuard - User Authentication Methods," Entrust, May 2006, http://www.entrust.com/strong-authentication/user-authentication/ methods.htm.
  • 12
    • 33947636496 scopus 로고    scopus 로고
    • Identity Verification and Authentication Solutions, Verid®, May 2006, http://www.verid.com/authentication.html.
    • "Identity Verification and Authentication Solutions," Verid®, May 2006, http://www.verid.com/authentication.html.
  • 13
    • 33947705064 scopus 로고    scopus 로고
    • May
    • "VerifyU™," UW Credit Union, May 2006, http://www.uwcu.org/products/webbranch/VerifyU.asp.
    • (2006) UW Credit Union
    • VerifyU™1
  • 14
    • 78049444778 scopus 로고    scopus 로고
    • Future Directions in User Authentication
    • B. Kaliski, "Future Directions in User Authentication," Proc. IT-DEFENSE '05, 2005.
    • (2005) Proc. IT-DEFENSE '05
    • Kaliski, B.1
  • 15
    • 33947666497 scopus 로고    scopus 로고
    • Identity Fraud: Providing a Solution
    • white paper, LexisNexis
    • N.A. Willox and T.M. Regan, "Identity Fraud: Providing a Solution," white paper, LexisNexis, 2002, http://www.lexisnexis.com/about/ whitepaper/IdentityFraud.pdf.
    • (2002)
    • Willox, N.A.1    Regan, T.M.2
  • 16
    • 33947711624 scopus 로고    scopus 로고
    • W. Burr, NIST E-Authentication Guidance: Can We Add KBA, Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
    • W. Burr, "NIST E-Authentication Guidance: Can We Add KBA," Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
  • 17
    • 84856043672 scopus 로고
    • A Mathematical Theory of Communication
    • July
    • C.E. Shannon, "A Mathematical Theory of Communication," Bell System Technical J., vol. 27, pp. 379-423, July 1948, http://cm.bell-labs. com/cm/ms/what/shannonday/paper.html.
    • (1948) Bell System Technical J , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 18
    • 0004013982 scopus 로고    scopus 로고
    • Entropy Measures and Unconditional Security in Cryptography
    • U. Maurer, ed, Hartung-Gorre Verlag
    • C. Cachin, "Entropy Measures and Unconditional Security in Cryptography," ETH Series in Information Security and Cryptography, U. Maurer, ed., vol. 1, Hartung-Gorre Verlag, 1997, http://www.zurich.ibm.com/ ~cca/papers/diss.ps.gz.
    • (1997) ETH Series in Information Security and Cryptography , vol.1
    • Cachin, C.1
  • 19
    • 84944486544 scopus 로고
    • Prediction and Entropy of Printed English
    • C.E. Shannon, "Prediction and Entropy of Printed English," Bell System Technical J., vol. 30, no. 1, pp. 50-64, 1951.
    • (1951) Bell System Technical J , vol.30 , Issue.1 , pp. 50-64
    • Shannon, C.E.1
  • 20
    • 33947642991 scopus 로고    scopus 로고
    • The Authentication Scorecard
    • white paper, RSA Security
    • "The Authentication Scorecard," white paper, RSA Security, 2004, http://www.rsasecurity.com/products/securid/whitepapers/ASC_WP_0904.pdf.
    • (2004)
  • 21
    • 33947703498 scopus 로고    scopus 로고
    • Are You Sharing Too Much?
    • K. Murphy, "Are You Sharing Too Much?" Vantage Magazine, voL 2, no. 2, 2005.
    • (2005) Vantage Magazine , vol.2 , Issue.2
    • Murphy, K.1
  • 22
    • 33947657772 scopus 로고    scopus 로고
    • Safety and Security Tips: Buying and Selling on Amazon.com
    • "Safety and Security Tips: Buying and Selling on Amazon.com," http://www.amazon.com/exec/obidos/tg/browse/-/10412241/ref=br_bx_c_1_2/ 104-9237732-6319118. May 2006.
    • (2006)
  • 23
    • 33947674588 scopus 로고    scopus 로고
    • Managing Your eBay Member Account If You Forgot Your Password
    • May
    • "Managing Your eBay Member Account If You Forgot Your Password," http://pages.ebay.com/help/account/password.html, May 2006.
    • (2006)
  • 26
    • 84976362631 scopus 로고
    • Real-World Applications of Bayesian Networks
    • D. Heckerman, A. Mamdani, and M.P. Wellman, "Real-World Applications of Bayesian Networks," Comm. ACM, vol. 38, no. 3, pp. 24-26, 1995.
    • (1995) Comm. ACM , vol.38 , Issue.3 , pp. 24-26
    • Heckerman, D.1    Mamdani, A.2    Wellman, M.P.3
  • 27
    • 85008015613 scopus 로고    scopus 로고
    • Building Probabilistic Networks: Where Do the Numbers Come From? Guest Editors' Introduction
    • July/Aug
    • M.J. Druzdzel and L.C. van der Gaag, "Building Probabilistic Networks: Where Do the Numbers Come From? Guest Editors' Introduction," IEEE Trans. Knowledge and Data Eng., vol. 12, no. 4, pp. 481-486, July/Aug. 2000.
    • (2000) IEEE Trans. Knowledge and Data Eng , vol.12 , Issue.4 , pp. 481-486
    • Druzdzel, M.J.1    van der Gaag, L.C.2
  • 28
    • 0034215972 scopus 로고    scopus 로고
    • Constructing Bayesian Networks for Medical Diagnosis from Incomplete and Partially Correct Statistics
    • July/Aug
    • D. Nikovski, "Constructing Bayesian Networks for Medical Diagnosis from Incomplete and Partially Correct Statistics," IEEE Trans. Knowledge and Data Eng., vol. 12, no. 4, pp. 509-516, July/Aug. 2000.
    • (2000) IEEE Trans. Knowledge and Data Eng , vol.12 , Issue.4 , pp. 509-516
    • Nikovski, D.1
  • 29
    • 3042636507 scopus 로고    scopus 로고
    • A Case Study of Applying Boosting Naïve Bayes to Claim Fraud Diagnosis
    • May
    • S. Viaene, R.A. Derrig, and G. Dedene, "A Case Study of Applying Boosting Naïve Bayes to Claim Fraud Diagnosis," IEEE Trans. and Knowledge Data Eng., vol. 16, no. 5, pp. 612-620, May 2004.
    • (2004) IEEE Trans. and Knowledge Data Eng , vol.16 , Issue.5 , pp. 612-620
    • Viaene, S.1    Derrig, R.A.2    Dedene, G.3
  • 32
  • 33
    • 0002652285 scopus 로고    scopus 로고
    • A Maximum Entropy Approach to Natural Language Processing
    • A. Berger, S.D. Pietra, and V.D. Pietra, "A Maximum Entropy Approach to Natural Language Processing," Computational Linguistics, vol. 22, no. 1, pp. 39-71, 1996.
    • (1996) Computational Linguistics , vol.22 , Issue.1 , pp. 39-71
    • Berger, A.1    Pietra, S.D.2    Pietra, V.D.3
  • 34
    • 0030181951 scopus 로고    scopus 로고
    • A Maximum Entropy Approach to Adaptive Statistical Language Modeling
    • R. Rosenfeld, "A Maximum Entropy Approach to Adaptive Statistical Language Modeling," Computer Speech and Language, vol. 10, no. 3, pp. 187-228, 1996.
    • (1996) Computer Speech and Language , vol.10 , Issue.3 , pp. 187-228
    • Rosenfeld, R.1
  • 35
    • 12844275960 scopus 로고    scopus 로고
    • Password Memorability and Security: Empirical Results
    • Sept./Oct
    • J. Yan, A. Blackwell, R. Anderson, and A. Grant, "Password Memorability and Security: Empirical Results," IEEE Security and Privacy, vol. 2, no. 5, pp. 25-31, Sept./Oct. 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 25-31
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4
  • 36
    • 0003369812 scopus 로고
    • A Comparison of Password Techniques for Multilevel Authentication Mechanisms
    • M. Zviran and W.J. Haga, "A Comparison of Password Techniques for Multilevel Authentication Mechanisms," The Computer J., vol. 36, no. 3, pp. 227-237, 1993.
    • (1993) The Computer J , vol.36 , Issue.3 , pp. 227-237
    • Zviran, M.1    Haga, W.J.2
  • 37
    • 0141607834 scopus 로고    scopus 로고
    • The Representational Power of Discrete Bayesian Networks
    • C.X. Ling and H. Zhang, "The Representational Power of Discrete Bayesian Networks," J. Machine Learning Research, vol. 3, pp. 709-721, 2003.
    • (2003) J. Machine Learning Research , vol.3 , pp. 709-721
    • Ling, C.X.1    Zhang, H.2
  • 47
    • 21244466146 scopus 로고
    • Zur Theorie der Gesellschaftsspiele
    • J. von Neumann, "Zur Theorie der Gesellschaftsspiele," Mathematische Annalen, vol. 100, no. 1, pp. 295-320, 1928.
    • (1928) Mathematische Annalen , vol.100 , Issue.1 , pp. 295-320
    • von Neumann, J.1
  • 48
    • 0002021736 scopus 로고
    • Equilibrium Points in N-Person Garnes
    • J.F. Nash, "Equilibrium Points in N-Person Garnes," Proc. Nat'l Academy of Sciences of the USA, vol. 36, no. 1, pp. 48-19, 1950.
    • (1950) Proc. Nat'l Academy of Sciences of the USA , vol.36 , Issue.1 , pp. 48-19
    • Nash, J.F.1
  • 49
    • 3042824043 scopus 로고    scopus 로고
    • A Study of Smoothing Methods for Language Models Applied to Information Retrieval
    • C. Zhai and J. Lafferty, "A Study of Smoothing Methods for Language Models Applied to Information Retrieval," ACM Trans. Information Systems (TOIS), vol. 22, no. 2, pp. 179-214, 2004
    • (2004) ACM Trans. Information Systems (TOIS) , vol.22 , Issue.2 , pp. 179-214
    • Zhai, C.1    Lafferty, J.2
  • 50
    • 0003860037 scopus 로고    scopus 로고
    • W.R. Gilks, S. Richardson, and D.J. Spiegelhalter, eds. Chapman & Hall/CRC
    • Markov Chain Monte Carlo in Practice, W.R. Gilks, S. Richardson, and D.J. Spiegelhalter, eds. Chapman & Hall/CRC, 1996.
    • (1996) Markov Chain Monte Carlo in Practice
  • 51
    • 0021518209 scopus 로고
    • Stochastic Relaxation, Gibbs Distributions, and the Bayesian Restoration of Images
    • S. Geman and D. Geman, "Stochastic Relaxation, Gibbs Distributions, and the Bayesian Restoration of Images," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 6, no. 6, pp. 721-741, 1984.
    • (1984) IEEE Trans. Pattern Analysis and Machine Intelligence , vol.6 , Issue.6 , pp. 721-741
    • Geman, S.1    Geman, D.2
  • 53
    • 33947615021 scopus 로고    scopus 로고
    • SMILE (Structural Modeling, Inference, and Learning Engine)
    • Decision Systems Laboratory, Univ. of Pittsburgh, June
    • "SMILE (Structural Modeling, Inference, and Learning Engine)," Decision Systems Laboratory, Univ. of Pittsburgh, June 2006, http://genie.sis.pitt.edu.
    • (2006)
  • 54
    • 0033901049 scopus 로고    scopus 로고
    • On the Determination of Subjective Probability by Choices
    • E. Karni and P. Mongin, "On the Determination of Subjective Probability by Choices," Management Science, vol. 46, no. 2, pp. 233-248, 2000.
    • (2000) Management Science , vol.46 , Issue.2 , pp. 233-248
    • Karni, E.1    Mongin, P.2
  • 55
    • 25844499944 scopus 로고    scopus 로고
    • Subjective Probability Assessment in Decision Analysis: Partition Dependence and Bias toward the Ignorance Prior
    • C.R. Fox and R.T. Clemen, "Subjective Probability Assessment in Decision Analysis: Partition Dependence and Bias toward the Ignorance Prior," Management Science, vol. 51, no. 9, pp. 1417-1432, 2005.
    • (2005) Management Science , vol.51 , Issue.9 , pp. 1417-1432
    • Fox, C.R.1    Clemen, R.T.2
  • 56
    • 0002843594 scopus 로고
    • The Consensus of Subjective Probability Distributions
    • R.L. Winkler, "The Consensus of Subjective Probability Distributions," Management Science, vol. 15, no. 2, pp. 61-75, 1968.
    • (1968) Management Science , vol.15 , Issue.2 , pp. 61-75
    • Winkler, R.L.1
  • 57
    • 0010298686 scopus 로고
    • Subjective Probability and the Theory of Games
    • J.B. Kadane and P.D. Larkey, "Subjective Probability and the Theory of Games," Management Science, vol. 28, no. 2, pp. 113-120, 1982.
    • (1982) Management Science , vol.28 , Issue.2 , pp. 113-120
    • Kadane, J.B.1    Larkey, P.D.2
  • 58
    • 11844297349 scopus 로고    scopus 로고
    • Games with Incomplete Information Played by 'Bayesian' Players, III
    • J.C. Harsanyi, "Games with Incomplete Information Played by 'Bayesian' Players, III," Management Science, vol. 50, no. 12 supplement, pp. 1804-1817, 2004.
    • (2004) Management Science , vol.50 , Issue.12 SUPPL.EMENT , pp. 1804-1817
    • Harsanyi, J.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.