Skip to main content

Theoretical Requirements of a Transparent Authentication System

  • Chapter
  • First Online:
Transparent User Authentication
  • 917 Accesses

Abstract

Part 1 of the book clearly identified the current issues surrounding user authentication, the increasing burden placed upon the end-user and the fundamental flaw that links authentication with an initial login rather than the specific action that carries the risk. It introduced the concept of transparent and continuous authentication as a process for enabling a more reliable and realistic measure of the system’s confidence in the identity of the user. Part 2 of the book provided a more technical insight into the current authentication processes and illustrated how transparent authentication could function on an individual technique perspective. Key to this concept is the use of biometrics and this section also evidenced the role multibiometrics and biometric standards have in establishing effective transparent authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Clarke, N.L.: Advanced user authentication for mobile devices. PhD Thesis, University of Plymouth, Plymouth (2004)

    Google Scholar 

  • Clarke, N.L., Furnell, S.M.: Keystroke dynamics on a mobile handset: a feasibility study. Inform. Manage. Comput. Secur. 11(4), 161–166 (2003)

    Article  Google Scholar 

  • Clarke, N.L., Furnell, S.M.: A composite user authentication architecture for mobile devices. J. Inform. Warfare 5(2), 11–29 (2006)

    Google Scholar 

  • Karatzouni, S., Clarke, N.L., Furnell, S.M.: NICA design specification. University of Plymouth. Available at: http://www.cscan.org/nica/ (2007). Accessed 10 Apr 2011

  • Mansfield, T., Kelly, G., Chandler, D., Kane, J.: Biometric Product Testing: Final Report. Crown Copyright, UK (2001)

    Google Scholar 

  • Monrose, F., Reiter, M., Wetzel, S.: Password hardening based upon keystroke dynamics. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, New York (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nathan Clarke .

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag London Limited

About this chapter

Cite this chapter

Clarke, N. (2011). Theoretical Requirements of a Transparent Authentication System. In: Transparent User Authentication. Springer, London. https://doi.org/10.1007/978-0-85729-805-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-0-85729-805-8_8

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-0-85729-804-1

  • Online ISBN: 978-0-85729-805-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics