Advertisement

Am I Really Who I Claim to Be?

  • Olivier CoupelonEmail author
  • Diyé Dia
  • Yannick Loiseau
  • Olivier Raynaud
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 353)

Abstract

Faced with both identity theft and the theft of means of authentication, users of digital services are starting to look rather suspiciously at online systems. The behavior is made up of a series of observable actions of an Internet user and, taken as a whole, the most frequent of these actions amount to habit. Habit and reputation offer ways of recognizing the user. The introduction of an implicit means of authentication based upon the users’ behavior allows websites and businesses to rationalize the risks they take when authorizing access to critical functionalities. This rationalization brings with it user trust as a result of increased security.

Keywords

Implicit authentication user behavior trust reputation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    CDC-ACSEL, B.: Résultats de la 3ème édition du baromètre caisse des dépôts/acsel sur la confiance des français dans le numérique (2013)Google Scholar
  2. 2.
    Nissenbaum, H.: Securing trust online: wisdom or oxymoron? Boston University Law Review 81(3) 635-664 (2001)Google Scholar
  3. 3.
    Donovan, A., Yolanda, G.: A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the WWW 5, 58–71 (2007)CrossRefGoogle Scholar
  4. 4.
    Yang, Y.C.: Web user behavioral profiling for user identification. Decision Support Systems (49), 261–271 (2010)Google Scholar
  5. 5.
    Basu, A.: A Reputation Framework for Behavioral History. PhD thesis (2010)Google Scholar
  6. 6.
    Marsh, S.P.: Formalizing Trust as a Computational Concept. PhD thesis (1994)Google Scholar
  7. 7.
    Herrmann, D., Banse, C., Federrath, H.: Behavior-based tracking: Exploiting characteristic patterns in dns traffic. Computer & Security 1-17 (2013)Google Scholar
  8. 8.
    Stockinger, T.: Implicit authentication on mobile devices. The Media Informatics Advanced Seminar on Ubiquitous Computing (2011)Google Scholar
  9. 9.
    Micallef, N., Just, M., Baillie, L., Kayacik, G.: Towards an app-driven mobile authentication model. In: Proceedings of the 9th Symposium on Usable Privacy and Security, UK (2013)Google Scholar
  10. 10.
    Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 99–113. Springer, Heidelberg (2011)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Olivier Coupelon
    • 1
    Email author
  • Diyé Dia
    • 1
    • 2
  • Yannick Loiseau
    • 2
  • Olivier Raynaud
    • 2
  1. 1.AlmerysClermont-FerrandFrance
  2. 2.Blaise Pascal UniversityAubièreFrance

Personalised recommendations