Proceedings of the 19th European Conference on Pattern Languages of Programs 2014
DOI: 10.1145/2721956.2721960
|View full text |Cite
|
Sign up to set email alerts
|

The history-based authentication pattern

Abstract: We propose a security pattern, namely the History-Based Authentication pattern, designed to strengthen the authentication process. It can be applied to entities endowed with communication, memory and processing capabilities. Our proposal consists of exploiting such capabilities to enable entities to record, be aware of and report on their own history. Authentication is based upon the capability of an entity to satisfactorily account for its history. Our proposal is test-bedded in a security and safety system, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…On the other hand, a system without access control will even encounter problems in logging its users' behaviors. Nonetheless, there is already a vast number of studies focused on authentication and authorization patterns (Ciria et al, 2014), (Steinegger et al, 2016), (Fernández et al, 2014), (Priebe et al, 2004) and the field can benefit from more research towards patterns for privacy, monitoring, administration, and recovery. The same can be said about patterns in different types of environments.…”
Section: Research Efforts Towards Security Pattern Development (Rq4 R...mentioning
confidence: 99%
“…On the other hand, a system without access control will even encounter problems in logging its users' behaviors. Nonetheless, there is already a vast number of studies focused on authentication and authorization patterns (Ciria et al, 2014), (Steinegger et al, 2016), (Fernández et al, 2014), (Priebe et al, 2004) and the field can benefit from more research towards patterns for privacy, monitoring, administration, and recovery. The same can be said about patterns in different types of environments.…”
Section: Research Efforts Towards Security Pattern Development (Rq4 R...mentioning
confidence: 99%