Continuous authentication based on computer securityReport as inadecuate

Continuous authentication based on computer security - Download this document for free, or read online. Document in PDF available to download.

2009 (English)Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis

Abstract [en] : In this thesis paper, the comparison between re-authentication and continuous authentication has been performed. Re-authentication is the traditional way to identify users and cannot monitor the user in an ongoing process. This has spawned a new breed of authentication software that monitors the user continuously during the session. The use of multimodal biometric systems in a continuous authentication process, in order to authenticate the user is now a reality. There are two research questions in the thesis: Does continuous authentication provide a feasible solution for identifying computer users in a transmission session? How is system security and usability affected by using a biometric multimodal system during the continuous authentication process? There is a strong need for new technologies to overpass intrinsic limitations of established techniques. It is up to us to determine the real potential and limitations of existing techniques. There is no best way to protect the user¡¯s computer security, but we can always try to improve upon what we have. Security is a process, not a product. Computer security is everyone¡¯s responsibility.

Place, publisher, year, edition, pages: 2009.

Keyword [en] : Social Behaviour Law

Keyword [sv] : Samhälls-, beteendevetenskap, juridik

Identifiers: URN: urn:nbn:se:ltu:diva-52335ISRN: LTU-PB-EX--09/005--SELocal ID: 97737b49-b090-4c23-97c6-b94a93d945fdOAI: diva2:1025705

Subject / course: Student thesis, at least 15 credits

Educational program: Computer and Information Systems Science, master's level

Examiners : Furberg, Lars

Note: Validerat; 20101217 (root)Available from: 2016-10-04 Created: 2016-10-04Bibliographically approved

Author: Yan, Jing


Related documents