Transparent User Authentication Biometrics, RFID and Behavioural Pro
No existing user-authentication approaches provide universally strong user authentication, while also taking into account the human factors of good security design. A reevaluation is therefore vitally necessary to ensure user authentication is relevant, u
- PDF / 6,291,780 Bytes
- 239 Pages / 439.37 x 666.142 pts Page_size
- 74 Downloads / 158 Views
Nathan Clarke
Transparent User Authentication Biometrics, RFID and Behavioural Profiling
Nathan Clarke Centre for Security, Communications & Network Research (CSCAN) Plymouth University Drake Circus PL4 8AA Plymouth United Kingdom [email protected]
ISBN 978-0-85729-804-1 e-ISBN 978-0-85729-805-8 DOI 10.1007/978-0-85729-805-8 Springer London Dordrecht Heidelberg New York British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Control Number: 2011935034 © Springer-Verlag London Limited 2011 Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms of licenses issued by the Copyright Licensing Agency. Enquiries concerning reproduction outside those terms should be sent to the publishers. The use of registered names, trademarks, etc., in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant laws and regulations and therefore free for general use. The publisher makes no representation, express or implied, with regard to the accuracy of the information contained in this book and cannot accept any legal responsibility or liability for any errors or omissions that may be made. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)
Preface
The world of user authentication is focussed upon developing technologies to solve the problem of point-of-entry identity verification required by many information systems. Unfortunately, authentication approaches; secret knowledge, token and biometric, all fail to provide universally strong user authentication – with various well-documented failings existing. Moreover, existing approaches fail to identify the real information security risk. Authenticating users at point-of-entry, and failing to require re-authentication of the user during the session provides a vast oppor tunity for attackers to compromise a system. However, forcing users to continuously re-authenticate to systems is cumbersome and fails to take into account the human factors of good security design, in order to ensure good levels of acceptability. Unfortunately, within this context, the need to authenticate is increasing rather than decreasing, with users interacting and engaging with a prolific variety of technologies from PCs to PDAs, social networking to share dealing, and Instant Messenger to Texting. A re-evaluation is therefore necessary to ensure user authentication is relevant, usable, secure and ubiquitous. The book presents the problem of user authentication from a completely different standpoint to current literature. Rather than describing the requirements, technologies and impleme
Data Loading...