Unified authentication factors and fuzzy service access using interaction provenance

Citation data:

Computers & Security, ISSN: 0167-4048, Vol: 67, Page: 211-231

Publication Year:
2017
Usage 286
Abstract Views 280
Link-outs 6
Captures 1
Exports-Saves 1
Social Media 175
Shares, Likes & Comments 174
Tweets 1
DOI:
10.1016/j.cose.2017.02.014
Author(s):
Ragib Hasan, Rasib Khan
Publisher(s):
Elsevier BV
Tags:
Computer Science, Social Sciences
Most Recent Tweet View All Tweets
article description
Authentication in service oriented computing is vulnerable to various security concerns. The core concept of authentication is dependent on credentials offered at the present moment without verifying how or when the credential was obtained by the subject. Secure authentication techniques with multi-factor and cross-platform technologies are adopted by service providers. Unfortunately, such systems require a complex integration procedure of the security frameworks. Moreover, the trend of rapid service development via service composition architectures are impeded due to the diverse models of authentication factors. Hence, the adoptability of newer authentication models are limited and constrained by the feature specifications of the external cross-platform and decentralized authentication and access control frameworks. In general, authentication models are generally based on binary successes and failures, regardless of the level of access required for a given request. The combined outcome of the above complexities results in rigid policies and complex management.

This article has 0 Wikipedia mention.