A Survey on Adaptive Authentication

@article{Cabarcos2019ASO,
  title={A Survey on Adaptive Authentication},
  author={Patricia Arias Cabarcos and Christian Krupitzer and C. Becker},
  journal={ACM Computing Surveys (CSUR)},
  year={2019},
  volume={52},
  pages={1 - 30}
}
  • Patricia Arias Cabarcos, Christian Krupitzer, C. Becker
  • Published 2019
  • Computer Science
  • ACM Computing Surveys (CSUR)
  • Adaptive Authentication allows a system to dynamically select the best mechanism(s) for authenticating a user depending on contextual factors, such as location, proximity to devices, and other attributes. Though this technology has the potential to change the current password-dominated authentication landscape, research to date has not led to practical solutions that transcend to our daily lives. Motivated to find out how to improve adaptive authentication design, we provide a structured survey… CONTINUE READING
    5 Citations

    Figures, Tables, and Topics from this paper

    Explore Further: Topics Discussed in This Paper

    Method of Access Subject Authentication Profile Generation
    A Self-adapting Face Authentication System with Deep Learning
    • Hind Baaqeel, S. Olatunji
    • Computer Science
    • 2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)
    • 2020
    Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge

    References

    SHOWING 1-10 OF 35 REFERENCES
    Adaptive authentication based on analysis of user behavior
    • 12
    • Highly Influential
    CASA: context-aware scalable authentication
    • 124
    • Highly Influential
    • PDF
    SmartAuth: dynamic context fingerprinting for continuous user authentication
    • 29
    • Highly Influential
    • PDF
    Progressive Authentication: Deciding When to Authenticate on Mobile Phones
    • 171
    • Highly Influential
    • PDF
    Context-Aware Authentication Framework
    • 14
    • Highly Influential
    Toward the design of adaptive selection strategies for multi-factor authentication
    • 33
    • Highly Influential
    Trust-enhanced Security in Location-based Adaptive Authentication
    • 28
    • Highly Influential
    • PDF
    Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing
    • 146
    • Highly Influential
    • PDF
    Choose Your Own Authentication
    • 12
    • Highly Influential
    • PDF
    Privacy-Based Adaptive Context-Aware Authentication System for Personal Mobile Devices
    • 2
    • Highly Influential
    • PDF