A Multi-Factor Authentication Scheme Using Attributed Access Control and Message Context
نویسندگان
چکیده
منابع مشابه
3CAuth - A Novel Multi-Factor Authentication Scheme Using QR-Code
A multi factor authentication scheme called ’3C-Auth’ is proposed in this paper. The scheme carries out a comprehensive authentication process using the smart card, secret-pin, registered finger print, and registered mobile number of the user. The user’s password is neither transmitted in plaintext form nor revealed to the authentication server. The scheme is shone to be proof against phishing,...
متن کاملContext-Dependent Authentication and Access Control
As mobile computing continues to rise, users are increasingly able to connect to remote services from a wide range of settings. To provide this flexibility, security policies must be adaptive to the user’s environment when the request is made. In our work, we define context to include the spatiotemporal aspects of the user request, in addition to quantifiable environmental factors determined by...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملImproving the Authentication Scheme and Access Control Protocol for VANETs
Privacy and security are very important in vehicular ad hoc networks (VANETs). VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs ra...
متن کاملDevice fingerprinting identification and authentication: A two-fold use in multi-factor access control schemes
Network security has always had an issue with secure authentication and identification. In the current mixed device network of today, the number of nodes on a network has expanded but these nodes are often unmanaged from a network security perspective. The solution proposed requires a paradigm shift, a recognition of what has already happened, identity is for sale across the internet. That iden...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2016
ISSN: 2278-1021
DOI: 10.17148/ijarcce.2016.5563