메뉴 건너뛰기




Volumn 13-17-April-2015, Issue , 2015, Pages 2185-2191

SmartAuth: Dynamic context fingerprinting for continuous user authentication

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE DEVICES; MOBILE TELECOMMUNICATION SYSTEMS;

EID: 84955451539     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2695664.2695908     Document Type: Conference Paper
Times cited : (41)

References (25)
  • 2
    • 84887036858 scopus 로고    scopus 로고
    • Cd-moa: Change detection framework for massive online analysis
    • A. Tucker, F. Höppner, A. Siebes, and S. Swift, Editors Volume 8207 of Lecture Notes in Computer Science, Springer
    • A. Bifet, J. Read, B. Pfahringer, G. Holmes, and I. Zliobaite. Cd-moa: Change detection framework for massive online analysis. In A. Tucker, F. Höppner, A. Siebes, and S. Swift, editors, IDA, volume 8207 of Lecture Notes in Computer Science, pages 92-103. Springer, 2013.
    • (2013) IDA , pp. 92-103
    • Bifet, A.1    Read, J.2    Pfahringer, B.3    Holmes, G.4    Zliobaite, I.5
  • 3
    • 84878353718 scopus 로고    scopus 로고
    • The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
    • Washington, DC, USA,. IEEE Computer Society
    • J. Bonneau, C. Herley, P. C. V. Oorschot, and F. Stajano. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12, pages 553-567, Washington, DC, USA, 2012. IEEE Computer Society.
    • (2012) Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12 , pp. 553-567
    • Bonneau, J.1    Herley, C.2    Oorschot, P.C.V.3    Stajano, F.4
  • 4
    • 84895061858 scopus 로고    scopus 로고
    • A survey on addressing privacy together with quality of context for context management in the internet of things
    • S. Chabridon, R. Laborde, T. Desprats, A. Oglaza, P. Marie, and S. M. Marquez. A survey on addressing privacy together with quality of context for context management in the internet of things. Annales des Télécommunications, 69(1-2):47-62, 2014.
    • (2014) Annales des Télécommunications , vol.69 , Issue.1-2 , pp. 47-62
    • Chabridon, S.1    Laborde, R.2    Desprats, T.3    Oglaza, A.4    Marie, P.5    Marquez, S.M.6
  • 5
    • 84862969473 scopus 로고    scopus 로고
    • When context is better than identity: Authentication by context using empirical channels
    • B. Christianson, B. Crispo, J. A. Malcolm, and F. Stajano, editors Cambridge, UK, March 28-30, Revised Selected Papers, volume 7114 of Lecture Notes in Computer Science, Springer, 2011
    • B. Chen, L. H. Nguyen, and A. W. Roscoe. When context is better than identity: Authentication by context using empirical channels. In B. Christianson, B. Crispo, J. A. Malcolm, and F. Stajano, editors, Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, volume 7114 of Lecture Notes in Computer Science, pages 115-125. Springer, 2011.
    • (2011) Security Protocols XIX - 19th International Workshop , pp. 115-125
    • Chen, B.1    Nguyen, L.H.2    Roscoe, A.W.3
  • 6
    • 84873691773 scopus 로고    scopus 로고
    • Rethinking passwords
    • Feb.
    • W. Cheswick. Rethinking passwords. Commun. ACM, 56(2):40-44, Feb. 2013.
    • (2013) Commun ACM , vol.56 , Issue.2 , pp. 40-44
    • Cheswick, W.1
  • 12
    • 84883312752 scopus 로고    scopus 로고
    • Security: Active authentication
    • R. P. Guidorizzi. Security: Active authentication. IT Professional, 15(4):4-7, 2013.
    • (2013) IT Professional , vol.15 , Issue.4 , pp. 4-7
    • Guidorizzi, R.P.1
  • 14
    • 84955502699 scopus 로고    scopus 로고
    • Adaptive access control brings together identity, risk and context
    • Aug
    • T. Henry. Adaptive Access Control Brings Together Identity, Risk and Context. Gartner Report. https://www.gartner.com/doc/2578515/adaptiveaccess- control-brings-identity, Aug 2013.
    • (2013) Gartner Report
    • Henry, T.1
  • 17
    • 84894218723 scopus 로고    scopus 로고
    • Geolocation and verification of IP-addresses with specific focus on ipv6
    • G. Wang, I. Ray, D. Feng, and M. Rajarajan, editors, volume 8300 of Lecture Notes in Computer Science, Springer
    • R. Koch, M. Golling, and G. D. Rodosek. Geolocation and Verification of IP-Addresses with Specific Focus on IPv6. In G. Wang, I. Ray, D. Feng, and M. Rajarajan, editors, CSS, volume 8300 of Lecture Notes in Computer Science, pages 151-170. Springer, 2013.
    • (2013) CSS , pp. 151-170
    • Koch, R.1    Golling, M.2    Rodosek, G.D.3
  • 18
    • 84926227657 scopus 로고    scopus 로고
    • Quality of context: Models and applications for context-aware systems in pervasive environments
    • A. Manzoor, H. L. Truong, and S. Dustdar. Quality of context: models and applications for context-aware systems in pervasive environments. Knowledge Eng. Review, 29(2):154-170, 2014.
    • (2014) Knowledge Eng. Review , vol.29 , Issue.2 , pp. 154-170
    • Manzoor, A.1    Truong, H.L.2    Dustdar, S.3
  • 20
    • 80053267657 scopus 로고    scopus 로고
    • A contextual approach to privacy online
    • H. Nissenbaum. A Contextual Approach to Privacy Online. Daedalus, 140(4):32-48, 2011.
    • (2011) Daedalus , vol.140 , Issue.4 , pp. 32-48
    • Nissenbaum, H.1
  • 23
    • 84955491877 scopus 로고    scopus 로고
    • Schneier on security
    • Nov.
    • B. Schneier. Schneier on Security. Risk-Based Authentication. https://www.schneier.com/blog/archives/2013/11/risk-based.html, Nov. 2013.
    • (2013) Risk-Based Authentication.
    • Schneier, B.1
  • 24
    • 85037074313 scopus 로고    scopus 로고
    • Implicit authentication through learning user behavior
    • E. Shi, Y. Niu, M. Jakobsson, and R. Chow. Implicit authentication through learning user behavior. Information Security, pages 99-113, 2011.
    • (2011) Information Security , pp. 99-113
    • Shi, E.1    Niu, Y.2    Jakobsson, M.3    Chow, R.4
  • 25
    • 84869141956 scopus 로고    scopus 로고
    • 2013
    • Verizon. 2013 Data Breach Investigations Report. http://www.verizonenterprise.com/resources/reports/rpdata-breach-investigations-report-2013enxg.pdf, 2013.
    • (2013) Data Breach Investigations Report.
    • Verizon.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.