Please use this identifier to cite or link to this item:
|Title:||Physical access protection using continuous authentication|
|Authors:||Yap, R.H.C. |
|Citation:||Yap, R.H.C., Sim, T., Kwang, G.X.Y., Ramnath, R. (2008). Physical access protection using continuous authentication. 2008 IEEE International Conference on Technologies for Homeland Security, HST'08 : 510-512. ScholarBank@NUS Repository. https://doi.org/10.1109/THS.2008.4534505|
|Abstract:||Traditional password based authentication systems assume that the user who manages to sign-on into the system is the actual authorized user. There is no differentiation between the authorized user and an intruder who knows how to signon into the system. This paper describes an authentication mechanism which reduces the risk of un-authorized system usage by continuously authenticating the current user. This is achieved by using biometric sensors which can verify the user in a transparent fashion. We have developed two such prototype systems - one for Linux, and the other for Windows - both of which are directly integrated with the operating system. This paper focuses on the Windows platform. The benefit of our continuous authentication system is that it gives a higher degree of assurance that the authorized user is indeed the one presently using the system, and does so in a way that is transparent to the user. Preliminary user studies on Windows demonstrate that continuous authentication can be used successfully on a user population using Windows on a variety of interactive applications which simulate a general task mix. Our studies show that the goal of transparency is achieved as most users were not bothered nor affected by presence of the continuous authentication system. ©2008 IEEE.|
|Source Title:||2008 IEEE International Conference on Technologies for Homeland Security, HST'08|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on May 15, 2018
WEB OF SCIENCETM
checked on May 8, 2018
checked on May 19, 2018
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.