Transparent User Authentication

Transparent User Authentication

4.11 - 1251 ratings - Source

This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication a€“ where authentication credentials are captured during a usera€™s normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discusses the need for user authentication; reviews existing authentication approaches; introduces novel behavioural biometrics techniques; examines the wider system-specific issues with designing large-scale multimodal authentication systems; concludes with a look to the future of user authentication.The secret-knowledge confidence levels have a somewhat different role. S1 has the effect of resetting the System Integrity level a€“ since in a clienta€“server topology , S1 represents the network administrator overriding the password (or PUK code anbsp;...

Title:Transparent User Authentication
Author:Nathan Clarke
Publisher:Springer Science & Business Media - 2011-08-17


You Must CONTINUE and create a free account to access unlimited downloads & streaming