Am I Really Who I Claim to Be?
Faced with both identity theft and the theft of means of authentication, users of digital services are starting to look rather suspiciously at online systems. The behavior is made up of a series of observable actions of an Internet user and, taken as a whole, the most frequent of these actions amount to habit. Habit and reputation offer ways of recognizing the user. The introduction of an implicit means of authentication based upon the users’ behavior allows websites and businesses to rationalize the risks they take when authorizing access to critical functionalities. This rationalization brings with it user trust as a result of increased security.
KeywordsImplicit authentication user behavior trust reputation
Unable to display preview. Download preview PDF.
- 1.CDC-ACSEL, B.: Résultats de la 3ème édition du baromètre caisse des dépôts/acsel sur la confiance des français dans le numérique (2013)Google Scholar
- 2.Nissenbaum, H.: Securing trust online: wisdom or oxymoron? Boston University Law Review 81(3) 635-664 (2001)Google Scholar
- 4.Yang, Y.C.: Web user behavioral profiling for user identification. Decision Support Systems (49), 261–271 (2010)Google Scholar
- 5.Basu, A.: A Reputation Framework for Behavioral History. PhD thesis (2010)Google Scholar
- 6.Marsh, S.P.: Formalizing Trust as a Computational Concept. PhD thesis (1994)Google Scholar
- 7.Herrmann, D., Banse, C., Federrath, H.: Behavior-based tracking: Exploiting characteristic patterns in dns traffic. Computer & Security 1-17 (2013)Google Scholar
- 8.Stockinger, T.: Implicit authentication on mobile devices. The Media Informatics Advanced Seminar on Ubiquitous Computing (2011)Google Scholar
- 9.Micallef, N., Just, M., Baillie, L., Kayacik, G.: Towards an app-driven mobile authentication model. In: Proceedings of the 9th Symposium on Usable Privacy and Security, UK (2013)Google Scholar