Please use this identifier to cite or link to this item: https://doi.org/10.1109/THS.2008.4534505
DC FieldValue
dc.titlePhysical access protection using continuous authentication
dc.contributor.authorYap, R.H.C.
dc.contributor.authorSim, T.
dc.contributor.authorKwang, G.X.Y.
dc.contributor.authorRamnath, R.
dc.date.accessioned2013-07-23T09:31:57Z
dc.date.available2013-07-23T09:31:57Z
dc.date.issued2008
dc.identifier.citationYap, R.H.C., Sim, T., Kwang, G.X.Y., Ramnath, R. (2008). Physical access protection using continuous authentication. 2008 IEEE International Conference on Technologies for Homeland Security, HST'08 : 510-512. ScholarBank@NUS Repository. https://doi.org/10.1109/THS.2008.4534505
dc.identifier.isbn1424419778
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/43360
dc.description.abstractTraditional password based authentication systems assume that the user who manages to sign-on into the system is the actual authorized user. There is no differentiation between the authorized user and an intruder who knows how to signon into the system. This paper describes an authentication mechanism which reduces the risk of un-authorized system usage by continuously authenticating the current user. This is achieved by using biometric sensors which can verify the user in a transparent fashion. We have developed two such prototype systems - one for Linux, and the other for Windows - both of which are directly integrated with the operating system. This paper focuses on the Windows platform. The benefit of our continuous authentication system is that it gives a higher degree of assurance that the authorized user is indeed the one presently using the system, and does so in a way that is transparent to the user. Preliminary user studies on Windows demonstrate that continuous authentication can be used successfully on a user population using Windows on a variety of interactive applications which simulate a general task mix. Our studies show that the goal of transparency is achieved as most users were not bothered nor affected by presence of the continuous authentication system. ©2008 IEEE.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/THS.2008.4534505
dc.sourceScopus
dc.typeConference Paper
dc.contributor.departmentTEMASEK LABORATORIES
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1109/THS.2008.4534505
dc.description.sourcetitle2008 IEEE International Conference on Technologies for Homeland Security, HST'08
dc.description.page510-512
dc.identifier.isiut000257944200093
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

SCOPUSTM   
Citations

16
checked on May 20, 2022

WEB OF SCIENCETM
Citations

8
checked on May 20, 2022

Page view(s)

201
checked on May 12, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.