[go: up one dir, main page]

Junquera-Sánchez et al., 2020 - Google Patents

JBCA: Designing an adaptative continuous authentication architecture

Junquera-Sánchez et al., 2020

View PDF
Document ID
8174368627720174112
Author
Junquera-Sánchez J
Cilleruelo-Rodríguez C
de-Marcos L
Martínez-Herráiz J
Publication year
Publication venue
Workshop of Physical Agents

External Links

Snippet

Several continuous authentication methods provide very accurate ways of detecting the impersonation of a user. However, even though they should be access control chain's links, they are commonly documented as algorithms unrelated to any system. In this paper, we …
Continue reading at protego-project.eu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology

Similar Documents

Publication Publication Date Title
US11677756B2 (en) Risk adaptive protection
US20230033192A1 (en) Data management systems and methods
Murmuria et al. Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users
US10891616B2 (en) System and method for effort-based user authentication
Martín et al. An approach to detect user behaviour anomalies within identity federations
Ahmad et al. Machine learning-based intelligent security framework for secure cloud key management
Yusop et al. Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity
Yang et al. TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
Pramila et al. A survey on adaptive authentication using machine learning techniques
Li et al. Generative Architecture for Data Imputation in Secure Blockchain-enabled Spatiotemporal Data Management
Swati et al. Innovations in blockchain using artificial intelligence
US20250021982A1 (en) Digital ecosystem with de-centralized secure transactions and edge ai technology to enable privacy preserved zero-id transactions
Junquera-Sánchez et al. JBCA: Designing an adaptative continuous authentication architecture
Mondal et al. Iot data security with machine learning blckchain: Risks and countermeasures
Mostafa et al. An interactive multi-factor user authentication framework in cloud computing
Arohan et al. An introduction to context-aware security and user entity behavior analytics
Junquera-Sánchez et al. JBCA: Designing an Adaptative
Dasgupta et al. Continuous Authentication: Authenticating individuals frequently during sessions to assure valid identity
Mekni et al. Instant User Insight: Dynamic Activity Profiling
Mahansaria et al. Contextual authentication of users and devices using machine learning
Sridhar et al. Intrusion detection using keystroke dynamics
Mehraj et al. Critical Challenges in Access Management Schemes for Smartphones: An Appraisal
Kimbahune et al. Distributed access control scheme for machine-to-machine communication in IoT using trust factor
Reddy et al. PRAN: A Provenance Based Model and Prototype to Strengthen Authentication
Subramanian et al. Log-Based Authentication for Cloud Environments