A Survey on: Continues and Transparent User Identity verification for secure internet Services

Authors

  • Sreedhar Kumar S Dr. T. Thimmaiah Institute of Technology, VTU, KGF, India
  • Hemaswetha L P New Horizon College of Engineering, Bengaluru, India.
  • Rajshanker Gobbi Indian Institute of Technology, Dharwad, India

Keywords:

conditional monitoring, secure internet, session, tasking

Abstract

A session browsing in internet is trivially under a specific username and password. Each session lasts for a defined time with a conditional monitoring system of the same. In this paper is brief study is made on how these session are monitored, conditions applied to grant a excess session time and then finally preset an overview discussion on these schemes and techniques under modern devices such as PC’s and Smart Phones.

References

Ojala, S., Keinanen, J., & Skytta, J. (2008, November). Wearable authentication device for transparent login in nomadic applications environment. In 2008 2nd International Conference on Signals, Circuits and Systems (pp. 1-6). IEEE.

Sim, T., Zhang, S., Janakiraman, R., & Kumar, S. (2007). Continuous verification using multimodal biometrics. IEEE transactions on pattern analysis and machine intelligence, 29(4), 687-700.

Montecchi, L., Lollini, P., Bondavalli, A., & Mattina, E. L. (2012, September). Quantitative security evaluation of a multi-biometric authentication system. In International Conference on Computer Safety, Reliability, and Security (pp. 209-221). Springer, Berlin, Heidelberg.

Li, S. Z., & Jain, A. (2015). Encyclopedia of biometrics. Springer Publishing Company, Incorporated.

LeMay, E., Unkenholz, W., Parks, D., Muehrcke, C., Keefe, K., & Sanders, W. H. (2010, September). Adversary-driven state-based system security evaluation. In Proceedings of the 6th International Workshop on Security Measurements and Metrics (pp. 1-9).

Courtney, T., Gaonkar, S., Keefe, K., Rozier, E. W., & Sanders, W. H. (2009, June). Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models. In 2009 IEEE/IFIP International Conference on Dependable Systems & Networks (pp. 353-358). IEEE.

Ahmed, S. T. (2017, June). A study on multi objective optimal clustering techniques for medical datasets. In 2017 international conference on intelligent computing and control systems (ICICCS) (pp. 174-177). IEEE.

Nicol, D. M., Sanders, W. H., & Trivedi, K. S. (2004). Model-based evaluation: from dependability to security. IEEE Transactions on dependable and secure computing, 1(1), 48-65.

Singh, K. D., & Ahmed, S. T. (2020, July). Systematic Linear Word String Recognition and Evaluation Technique. In 2020 International Conference on Communication and Signal Processing (ICCSP) (pp. 0545-0548). IEEE.

Sheyner, O., Haines, J., Jha, S., Lippmann, R., & Wing, J. M. (2002, May). Automated generation and analysis of attack graphs. In Proceedings 2002 IEEE Symposium on Security and Privacy (pp. 273-284). IEEE.

Downloads

Published

2022-08-10

How to Cite

Sreedhar Kumar S, Hemaswetha L P, & Rajshanker Gobbi. (2022). A Survey on: Continues and Transparent User Identity verification for secure internet Services. International Journal of Human Computations & Intelligence, 1(1), 22–24. Retrieved from https://milestoneresearch.in/JOURNALS/index.php/IJHCI/article/view/20