Evolving Technology and the Future for Authentication
The need for changes in the way authentication is performed has been clearly identified in the early chapters. Indeed the purpose of this text is to provide a different perspective on the problem – moving away from the traditional point-of-entry Boolean decision to a continuous identity confidence. The Transparent Authentication System (TAS) seeks to harness all authentication approaches and provide a level of flexibility to enable compatibility and acceptance from all aspects of society, the young, old, professional, unskilled and security-indifferent individual. However, this approach is far from being a panacea for the authentication problem.
KeywordsMobile Phone Intrusion Detection System Biometric System False Acceptance Rate Identity Verification
- Apple: Apple reports first quarter results. Apple Corporation. Available at: http://www.apple.com/uk/pr/library/2011/01/18results.html (2011). Accessed 10 Apr 2011
- BBC: Internet access is a fundamental human right. BBC News. Available at: http://news.bbc.co.uk/1/hi/technology/8548190.stm (2010). Accessed 10 Apr 2011
- Doddington, G., Liggett, W., Martin, A., Przybocki, M., Reynolds, D.: Sheep, goats, lambs and wolves: a statistical analysis of speaker performance in NIST 1998 Speaker recognition evaluation. In: Proceedings of the 5th International Conference on Spoken Language Processing (ICSLP), Sydney, Australia (1998)Google Scholar
- Hocking, C., Furnell, S.M., Clarke, N.L., Reynolds, P.: A distributed and cooperative user authentication framework. In: Proceedings of the 6th International Conference on Information Assurance and Security (IAS 2010), Atlanta (2010)Google Scholar