2018
DOI: 10.1016/j.infsof.2017.11.004
|View full text |Cite
|
Sign up to set email alerts
|

Kontun: A Framework for recommendation of authentication schemes and methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 17 publications
0
16
0
Order By: Relevance
“…A summary of the constructed framework's characteristics is provided next. A complete description can be found in [26].…”
Section: The Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…A summary of the constructed framework's characteristics is provided next. A complete description can be found in [26].…”
Section: The Frameworkmentioning
confidence: 99%
“…Specifically, the framework's recommendations were compared with the authentication schemes or methods implemented in existing applications developed by the PSDC or with the recommendations that their experts would give for hypothetical situations. The case studies are described in detail in [26]. Next, a brief summary of their application is provided.…”
Section: Case Studiesmentioning
confidence: 99%
“…Partly, because of the rapid pace of technology innovation in the domain, ever changing regulatory guidelines and the importance of identity management for the functioning of societies. These are exemplified in the following works: classification of authentication systems and their usability and drawbacks [9], survey of existing authentication methods [10], framework for recommendation of authentication schemes [11] and a review of authentication using behavioral biometrics [12]. Literature reviews on identity management have been done from various perspectives, such as surveys in the context of Internet of Things [13], authentication for e-government services [14], on privacy preservation [15] and strategies [16], identity and access management in cloud environments [17].…”
Section: Related Literaturementioning
confidence: 99%
“…In today's world, the legacy authentication process based on static passwords is considered a vulnerable authentication mechanism (Stanislav, 2015). A combined mechanism presented by combining the static factor (password only) and a multi-authentication factor that depends on an OTP (IETF, 1998) or a biometrics authentication factor (Velásquez et al, 2018) is more robust and trusted.…”
Section: Authentication and It Securitymentioning
confidence: 99%