A Survey on Adaptive Authentication
@article{Cabarcos2019ASO, title={A Survey on Adaptive Authentication}, author={Patricia Arias Cabarcos and Christian Krupitzer and C. Becker}, journal={ACM Computing Surveys (CSUR)}, year={2019}, volume={52}, pages={1 - 30} }
Adaptive Authentication allows a system to dynamically select the best mechanism(s) for authenticating a user depending on contextual factors, such as location, proximity to devices, and other attributes. Though this technology has the potential to change the current password-dominated authentication landscape, research to date has not led to practical solutions that transcend to our daily lives. Motivated to find out how to improve adaptive authentication design, we provide a structured survey… CONTINUE READING
Figures, Tables, and Topics from this paper
5 Citations
Method of Access Subject Authentication Profile Generation
- Computer Science
- 2020 International Russian Automation Conference (RusAutoCon)
- 2020
"I don't see why I would ever want to use it": Analyzing the Usability of Popular Smartphone Password Managers
- Computer Science
- CCS
- 2019
- 4
- PDF
A Self-adapting Face Authentication System with Deep Learning
- Computer Science
- 2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)
- 2020
Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge
- Computer Science
- 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC)
- 2019
A position paper on GDPR compliance in sharded blockchains: rehash of old ideas or new interesting challenges?
- Computer Science
- ArXiv
- 2020
- PDF
References
SHOWING 1-10 OF 35 REFERENCES
Adaptive authentication based on analysis of user behavior
- Computer Science
- 2014 Science and Information Conference
- 2014
- 12
- Highly Influential
SmartAuth: dynamic context fingerprinting for continuous user authentication
- Computer Science
- SAC
- 2015
- 29
- Highly Influential
- PDF
Progressive Authentication: Deciding When to Authenticate on Mobile Phones
- Computer Science
- USENIX Security Symposium
- 2012
- 171
- Highly Influential
- PDF
Toward the design of adaptive selection strategies for multi-factor authentication
- Computer Science
- Comput. Secur.
- 2016
- 33
- Highly Influential
Trust-enhanced Security in Location-based Adaptive Authentication
- Computer Science
- Electron. Notes Theor. Comput. Sci.
- 2008
- 28
- Highly Influential
- PDF
Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing
- Computer Science
- UbiComp
- 2003
- 146
- Highly Influential
- PDF
Privacy-Based Adaptive Context-Aware Authentication System for Personal Mobile Devices
- Computer Science
- J. Mobile Multimedia
- 2016
- 2
- Highly Influential
- PDF