TOWARDS USER AUTHENTICATION FLEXIBILITY

Laurent Gomez, Ivonne Thomas

2007

Abstract

In order to gain access to a resource protected by an authorization service, a user can be required to authenticate. Traditionally, user authentication is performed by means of a combination of authentication factors, statically specified in the access control policy of the authorization service. In this paper, we propose to improve the flexibility of user authentication by enabling to authenticate using authentication factors at his disposal. Authentication factor are any piece of information used to assess the identity of a user. Capitalizing on opinion metric from subjective logic (Josang, 2001), the authorization service specifies an authentication level to be reached in order to gain access to a resource.

References

  1. Al-Muhtadi, J. (2005). An Intelligent Authentication Infrastructure for Ubiquitous Computing Environments. University of Illinois at Urbana-Champaign.
  2. Josang, A. (2001). A logic for uncertain probabilities. In International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems.
  3. J.T Kohl, B.C Neuman, T. T. (1994). The evolution of the kerberos authentication system. In Distributed Open Systems. IEEE Computer Society Press.
  4. Liberty Alliance (2005). Liberty Alliance Project.
  5. M. Covington, M. A. e. a. (2004). Parametrized authentication. In Proceedings of the 9th European Symposium on Research in Computer Security. Springer.
  6. M.K Reither, S. S. (1999). Authentication metric analysis and design. In ACM Transactions on Information and System Security. ACM Press.
  7. OASIS (2005). XACML 2.0 - eXtended Access Control Markup Language.
  8. Pfleeger, C. (1997). Security in Computing. Prentice-Hall, Inc.
  9. S Ganeriwal, M. S. (2004). Reputation-based framework for high integrity sensor networks. In SASN 04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM Press.
  10. Schneier, B. (2005). Two-Factor Authentication: Too Little, Too Late. Communication of the ACM/Vol 48, No.4.
  11. Shafer, G. (1976). A Mathematical Theory of Evidence. Princeton Univ. Press. Princeton, NJ.
  12. W. Burr, D. Dodson, W. P. (2006). Electronic authentication guideline. In NIST Special Publication 800 63. National Institue of Standards and Technology.
Download


Paper Citation


in Harvard Style

Gomez L. and Thomas I. (2007). TOWARDS USER AUTHENTICATION FLEXIBILITY . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 59-66. DOI: 10.5220/0002122400590066


in Bibtex Style

@conference{secrypt07,
author={Laurent Gomez and Ivonne Thomas},
title={TOWARDS USER AUTHENTICATION FLEXIBILITY},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={59-66},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002122400590066},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - TOWARDS USER AUTHENTICATION FLEXIBILITY
SN - 978-989-8111-12-8
AU - Gomez L.
AU - Thomas I.
PY - 2007
SP - 59
EP - 66
DO - 10.5220/0002122400590066