2014 Science and Information Conference 2014
DOI: 10.1109/sai.2014.6918248
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive authentication based on analysis of user behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…The concept of graphs only benefited in providing basic insights into potential credential mixing risks within the network. Another study proposed an adaptive authentication for Malaysia government e-service, which combines multiple applications with single sign-on capabilities (Bakar & Haron, 2014). The user behavior profiling is generated based on the frequency of attribute values and the approach does not find the correlation between them.…”
Section: Trust Behaviormentioning
confidence: 99%
“…The concept of graphs only benefited in providing basic insights into potential credential mixing risks within the network. Another study proposed an adaptive authentication for Malaysia government e-service, which combines multiple applications with single sign-on capabilities (Bakar & Haron, 2014). The user behavior profiling is generated based on the frequency of attribute values and the approach does not find the correlation between them.…”
Section: Trust Behaviormentioning
confidence: 99%
“…4) Adaptive authentication: Authentication enables an application to identify its users. Adaptive authentication, also known as Risk Based Authentication, is a method for stronger authentication performed by profiling users' behavior and software and hardware usage profiling [18], and whenever a deviation is observed, step up authentication by challenging additional authentication scheme, for example, Two-Factor Authentication, and Multi-Factor Authentication (MFA).…”
Section: Application Defense Mechanismsmentioning
confidence: 99%
“…Fang Jing-Li has proposed [4], user authentication is an important part of information security. Bakar and Z. Zhang [5], [6] also proposed that user authentication allow users or systems that require access to prove their identities. Authentication requires supporting information to make sure that the information provided by users is in compliance with validation specifications.…”
Section: A User Authentication Technologymentioning
confidence: 99%