Theoretical Requirements of a Transparent Authentication System
Part 1 of the book clearly identified the current issues surrounding user authentication, the increasing burden placed upon the end-user and the fundamental flaw that links authentication with an initial login rather than the specific action that carries the risk. It introduced the concept of transparent and continuous authentication as a process for enabling a more reliable and realistic measure of the system’s confidence in the identity of the user. Part 2 of the book provided a more technical insight into the current authentication processes and illustrated how transparent authentication could function on an individual technique perspective. Key to this concept is the use of biometrics and this section also evidenced the role multibiometrics and biometric standards have in establishing effective transparent authentication.
KeywordsMobile Device Personal Identification Number False Acceptance Rate Biometric Template Authentication Request
- Clarke, N.L.: Advanced user authentication for mobile devices. PhD Thesis, University of Plymouth, Plymouth (2004)Google Scholar
- Clarke, N.L., Furnell, S.M.: A composite user authentication architecture for mobile devices. J. Inform. Warfare 5(2), 11–29 (2006)Google Scholar
- Karatzouni, S., Clarke, N.L., Furnell, S.M.: NICA design specification. University of Plymouth. Available at: http://www.cscan.org/nica/ (2007). Accessed 10 Apr 2011
- Mansfield, T., Kelly, G., Chandler, D., Kane, J.: Biometric Product Testing: Final Report. Crown Copyright, UK (2001)Google Scholar
- Monrose, F., Reiter, M., Wetzel, S.: Password hardening based upon keystroke dynamics. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, New York (1999)Google Scholar