A Method of Risk Assessment for Multi-Factor Authentication

نویسندگان

  • Jae-Jung Kim
  • Seng-Phil Hong
چکیده

User authentication refers to user identification based on something a user knows, something a user has, something a user is or something the user does; it can also take place based on a combination of two or more of such factors. With the increasingly diverse risks in online environments, user authentication methods are also becoming more diversified. This research analyzes user authentication methods being used in various online environments, such as web portals, electronic transactions, financial services and e-government, to identify the characteristics and issues of such authentication methods in order to present a user authentication level system model suitable for different online services. The results of our method are confirmed through a risk assessment and we verify its safety using the testing method presented in OWASP and NIST SP800-63. Keywords—Multi-factor Authentication, PKI, User Authentication, Biometric Authentication

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

risk assessment by integration approach of FMEA and multi criteria decision-making in the interval valued fuzzy environment: case study hydraulic pump manufacturing industry

Abstract Background and aims: Nowadays with increasing global competition, companies apply several scientific methods to identify, assess and remove potential failures in production process. The main goal of this study was identification and analysis of potential failure modes in a hydraulic pump manufacturing company by using combination of interval valued fuzzy Analytic network process (IVF-...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

The assessment of safety and health risk using multi-criteria evaluation technique and TOPSIS method in Ilam gas refinery

Background and Objective: This study was designed to assess the safety and health risk in Ilam gas refinery and evaluation of TOPSIS method performance in risk assessment. Materials and Methods:  After identifying 955 hazards case, the risks were ranked separately in the health and safety sectors using criteria such as exposure level, severity and probability of the occurrence and use TOPSIS m...

متن کامل

Risk Assessment of Investments with Fuzzy Efficiency Indicators for Oil and Gas Production Industry

In the process of investment decision making, next to financial indicators many other aspects of investment projects are increasingly often considered. This leads to the multi-criteria evaluation of a project. The advantage of multi-criteria methods is the ability to take into account all (not only financial) aspects of the attractiveness of an investment project. The selection of criteria of p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JIPS

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2011