PlumX Metrics
Embed PlumX Metrics

Continuous Authentication for Secure Mobile Applications

2010
  • 0
    Citations
  • 100
    Usage
  • 0
    Captures
  • 0
    Mentions
  • 0
    Social Media
Metric Options:   Counts1 Year3 Year

Metrics Details

Lecture / Presentation Description

Mobile devices like smart mobile phones, tablet computers, and netbooks have a key differentiation in usage pattern over traditional computing environments. These platforms are usually "outside of the firewall" and continuously exposed to "hostile" network environments. Therefore, we enter an era of computing that must assume nothing about traditional distributed computing interactions. To address this, I have been researching a cryptographic based mechanism for continuous authentication and data handling. This allows for a number of alternative approaches to traditional security mechanisms. This presentation will focus on describing continuous authentications challenges, applications, and possibilities. We will examine how to use traditional and non-traditional cryptographic techniques to address life outside the perimeter, and look at how we can actually leverage the continuously interactive aspects of modern mobile applications to enhance security.

Provide Feedback

Have ideas for a new metric? Would you like to see something else here?Let us know