Access Control beyond Authentication

نویسندگان

چکیده

Nowadays, the Zero Trust model has become one of standard security models. This paradigm stipulates as mandatory protection each endpoint, looking for providing to all network. To meet this end, it is necessary guarantee integrity access control systems. One possibility bringing different endpoints continuous authentication, an system. Continuous authentication set technologies capable determining if a user’s identity remains in time; whether he legitimate user (i.e., only who should know secret credentials) or been impersonated by someone else after authentication’s process was completed. does not require active participation user. Aiming identify involved implementations, evaluation methods, and its use cases, paper presents systematic review that synthesizes state art. conducted get picture about which data sources could allow systems successfully implemented, are most adequate ways data. also identifies defining dimensions

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication, Access Control, and Audit

—Authentication establishes the identity of one party to another. Most commonly authentication establishes the identity of a user to some part of the system, typically by means of a password. More generally, authentication can be computer-to-computer or process-toprocess and mutual in both directions. —Access control determines what one party will allow another to do with respect to resources a...

متن کامل

Beyond Risk-Based Access Control: Towards Incentive-Based Access Control

In recent years, risk-based access control has been proposed as an alternative to traditional rigid access control models such as multi-level security and role-based access control. While these approaches make the risks associated with exceptional access accountable and encourage the users to take low-risk actions, they also create the disincentives for seeking necessary risky accesses. We intr...

متن کامل

Context-Dependent Authentication and Access Control

As mobile computing continues to rise, users are increasingly able to connect to remote services from a wide range of settings. To provide this flexibility, security policies must be adaptive to the user’s environment when the request is made. In our work, we define context to include the spatiotemporal aspects of the user request, in addition to quantifiable environmental factors determined by...

متن کامل

Authentication and Access Control in P2P Network

Peer-to-Peer (P2P) networks are the latest addition to the universe of distributed systems. The security issues become more important then ever. Authentication and access control are the two main fields of the security issues. Different applications have different security requirements. In this paper, we analyze the settlements of the P2P Network security issues and the difficulty of the techno...

متن کامل

Authentication Mechanisms for Physical Access Control

The Smart Card Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption, use and widespread application of smart card technology. Through specific projects such as education programs, market research, advocacy, industry relations and open forums, the Alliance keeps its members connected to industry leaders and innovative thought. The Alliance is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2021

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2021/8146553