loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: J. Hatin 1 ; E. Cherrier 2 ; J.-J. Schwartzmann 1 ; V. Frey 3 and C. Rosenberger 4

Affiliations: 1 Normandie Univ., UNICAEN, ENSICAEN, CNRS and Orange Labs, France ; 2 Normandie Univ., CNRS, UNICAEN and ENSICAEN, France ; 3 Orange Labs, France ; 4 Normandie Univ., UNICAEN, ENSICAEN and CNRS, France

ISBN: 978-989-758-167-0

Keyword(s): Mobile Device, Trust Level, Continuous Authentication.

Abstract: The trust provided by authentication systems is commonly expressed with a Level of Assurance (LoA see 3). If it can be considered as a first process to simplify the expression of trust during the authentication step, it does not handle all the aspects of the authentication mechanism and especially it fails to integrate continuous authentication systems. In this paper, we propose a model based on the Dempster Shafer theory to merge continuous authentication system with more traditional static authentication scheme and to assign a continuous trust level to the current LoA. In addition, this method is proved to be compliant with the LoA frameworks.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.208.159.25

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Hatin, J.; Cherrier, E.; Schwartzmann, J.; Frey, V. and Rosenberger, C. (2016). A Continuous LoA Compliant Trust Evaluation Method.In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 355-363. DOI: 10.5220/0005738403550363

@conference{icissp16,
author={J. Hatin. and E. Cherrier. and J.{-}J. Schwartzmann. and V. Frey. and C. Rosenberger.},
title={A Continuous LoA Compliant Trust Evaluation Method},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2016},
pages={355-363},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005738403550363},
isbn={978-989-758-167-0},
}

TY - CONF

JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - A Continuous LoA Compliant Trust Evaluation Method
SN - 978-989-758-167-0
AU - Hatin, J.
AU - Cherrier, E.
AU - Schwartzmann, J.
AU - Frey, V.
AU - Rosenberger, C.
PY - 2016
SP - 355
EP - 363
DO - 10.5220/0005738403550363

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.