Unified authentication factors and fuzzy service access using interaction provenance

Citation data:

Computers & Security, ISSN: 0167-4048, Vol: 67, Page: 211-231

Publication Year:
Usage 286
Abstract Views 280
Link-outs 6
Captures 18
Readers 17
Exports-Saves 1
Social Media 175
Shares, Likes & Comments 174
Tweets 1
Ragib Hasan; Rasib Khan
Elsevier BV
Computer Science; Social Sciences
Most Recent Tweet View All Tweets
article description
Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered at the present moment without verifying how or when the credential was obtained by the subject. Secure authentication techniques with multi-factor and cross-platform technologies are adopted by service providers. Unfortunately, such systems require a complex integration procedure of the security frameworks. Moreover, the trend of rapid service development via service composition architectures are impeded due to the diverse models of authentication factors. Hence, the adoptability of newer authentication models are limited and constrained by the feature specifications of the external cross-platform and decentralized authentication and access control frameworks. In general, authentication models are generally based on binary successes and failures, regardless of the level of access required for a given request. The combined outcome of the above complexities results in rigid policies and complex management.