Known user continuous authentication system
dc.contributor.author | Brosso I. | |
dc.contributor.author | Ferreira F. | |
dc.contributor.author | Bressan G. | |
dc.contributor.author | Ruggiero W.V. | |
dc.date.accessioned | 2024-03-13T01:31:46Z | |
dc.date.available | 2024-03-13T01:31:46Z | |
dc.date.issued | 2010 | |
dc.description.abstract | This work presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a continuous authentication mechanism of users in software application. The KUCAS system makes use of environmental context information, users behavior analysis, the behavior theories of Skinner and the Mathematical Confidence of Dempster-Shafer Evidences Theory, that establishes trust levels to authenticate the user by his behavior analysis, during an application software, in a specific domain of the computer networks, in a period of time. The dynamics of enclosed management in this system compares the current behavior with the user's previous behaviors description and with the trust restrictions. In case of indications of changes in the user's behavior, the system provides the behavior analysis of the user using database restrictions information. If there are uncertainties and divergences, mechanisms of security and alert signals are triggered. ©2010 IEEE. | |
dc.identifier.doi | 10.1109/CCNC.2010.5421608 | |
dc.identifier.uri | https://dspace.mackenzie.br/handle/10899/37198 | |
dc.relation.ispartof | 2010 7th IEEE Consumer Communications and Networking Conference, CCNC 2010 | |
dc.rights | Acesso Restrito | |
dc.subject.otherlanguage | Access control | |
dc.subject.otherlanguage | Adaptative security policy | |
dc.subject.otherlanguage | Behavioral science | |
dc.subject.otherlanguage | Component | |
dc.subject.otherlanguage | Continuous authentication process | |
dc.subject.otherlanguage | Pervasive and ambient applications computer | |
dc.subject.otherlanguage | Security and content protection | |
dc.title | Known user continuous authentication system | |
dc.type | Artigo de evento | |
local.scopus.citations | 0 | |
local.scopus.eid | 2-s2.0-77951274988 | |
local.scopus.subject | Behavioral science | |
local.scopus.subject | Component | |
local.scopus.subject | Computer security | |
local.scopus.subject | Content Protection | |
local.scopus.subject | Security and content protection | |
local.scopus.subject | Security policy | |
local.scopus.updated | 2024-05-01 | |
local.scopus.url | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=77951274988&origin=inward |