Abstract
Part 1 of the book clearly identified the current issues surrounding user authentication, the increasing burden placed upon the end-user and the fundamental flaw that links authentication with an initial login rather than the specific action that carries the risk. It introduced the concept of transparent and continuous authentication as a process for enabling a more reliable and realistic measure of the system’s confidence in the identity of the user. Part 2 of the book provided a more technical insight into the current authentication processes and illustrated how transparent authentication could function on an individual technique perspective. Key to this concept is the use of biometrics and this section also evidenced the role multibiometrics and biometric standards have in establishing effective transparent authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Clarke, N.L.: Advanced user authentication for mobile devices. PhD Thesis, University of Plymouth, Plymouth (2004)
Clarke, N.L., Furnell, S.M.: Keystroke dynamics on a mobile handset: a feasibility study. Inform. Manage. Comput. Secur. 11(4), 161–166 (2003)
Clarke, N.L., Furnell, S.M.: A composite user authentication architecture for mobile devices. J. Inform. Warfare 5(2), 11–29 (2006)
Karatzouni, S., Clarke, N.L., Furnell, S.M.: NICA design specification. University of Plymouth. Available at: http://www.cscan.org/nica/ (2007). Accessed 10 Apr 2011
Mansfield, T., Kelly, G., Chandler, D., Kane, J.: Biometric Product Testing: Final Report. Crown Copyright, UK (2001)
Monrose, F., Reiter, M., Wetzel, S.: Password hardening based upon keystroke dynamics. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, New York (1999)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2011 Springer-Verlag London Limited
About this chapter
Cite this chapter
Clarke, N. (2011). Theoretical Requirements of a Transparent Authentication System. In: Transparent User Authentication. Springer, London. https://doi.org/10.1007/978-0-85729-805-8_8
Download citation
DOI: https://doi.org/10.1007/978-0-85729-805-8_8
Published:
Publisher Name: Springer, London
Print ISBN: 978-0-85729-804-1
Online ISBN: 978-0-85729-805-8
eBook Packages: Computer ScienceComputer Science (R0)