A Survey on: Continues and Transparent User Identity verification for secure internet Services
Keywords:
conditional monitoring, secure internet, session, taskingAbstract
A session browsing in internet is trivially under a specific username and password. Each session lasts for a defined time with a conditional monitoring system of the same. In this paper is brief study is made on how these session are monitored, conditions applied to grant a excess session time and then finally preset an overview discussion on these schemes and techniques under modern devices such as PC’s and Smart Phones.
References
Ojala, S., Keinanen, J., & Skytta, J. (2008, November). Wearable authentication device for transparent login in nomadic applications environment. In 2008 2nd International Conference on Signals, Circuits and Systems (pp. 1-6). IEEE.
Sim, T., Zhang, S., Janakiraman, R., & Kumar, S. (2007). Continuous verification using multimodal biometrics. IEEE transactions on pattern analysis and machine intelligence, 29(4), 687-700.
Montecchi, L., Lollini, P., Bondavalli, A., & Mattina, E. L. (2012, September). Quantitative security evaluation of a multi-biometric authentication system. In International Conference on Computer Safety, Reliability, and Security (pp. 209-221). Springer, Berlin, Heidelberg.
Li, S. Z., & Jain, A. (2015). Encyclopedia of biometrics. Springer Publishing Company, Incorporated.
LeMay, E., Unkenholz, W., Parks, D., Muehrcke, C., Keefe, K., & Sanders, W. H. (2010, September). Adversary-driven state-based system security evaluation. In Proceedings of the 6th International Workshop on Security Measurements and Metrics (pp. 1-9).
Courtney, T., Gaonkar, S., Keefe, K., Rozier, E. W., & Sanders, W. H. (2009, June). Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models. In 2009 IEEE/IFIP International Conference on Dependable Systems & Networks (pp. 353-358). IEEE.
Ahmed, S. T. (2017, June). A study on multi objective optimal clustering techniques for medical datasets. In 2017 international conference on intelligent computing and control systems (ICICCS) (pp. 174-177). IEEE.
Nicol, D. M., Sanders, W. H., & Trivedi, K. S. (2004). Model-based evaluation: from dependability to security. IEEE Transactions on dependable and secure computing, 1(1), 48-65.
Singh, K. D., & Ahmed, S. T. (2020, July). Systematic Linear Word String Recognition and Evaluation Technique. In 2020 International Conference on Communication and Signal Processing (ICCSP) (pp. 0545-0548). IEEE.
Sheyner, O., Haines, J., Jha, S., Lippmann, R., & Wing, J. M. (2002, May). Automated generation and analysis of attack graphs. In Proceedings 2002 IEEE Symposium on Security and Privacy (pp. 273-284). IEEE.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Sreedhar Kumar S, Hemaswetha L P, Rajshanker Gobbi
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.