This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication a where authentication credentials are captured during a useras normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discusses the need for user authentication; reviews existing authentication approaches; introduces novel behavioural biometrics techniques; examines the wider system-specific issues with designing large-scale multimodal authentication systems; concludes with a look to the future of user authentication.The secret-knowledge confidence levels have a somewhat different role. S1 has the effect of resetting the System Integrity level a since in a clientaserver topology , S1 represents the network administrator overriding the password (or PUK code anbsp;...
|Title||:||Transparent User Authentication|
|Publisher||:||Springer Science & Business Media - 2011-08-17|