Access Control beyond Authentication
نویسندگان
چکیده
Nowadays, the Zero Trust model has become one of standard security models. This paradigm stipulates as mandatory protection each endpoint, looking for providing to all network. To meet this end, it is necessary guarantee integrity access control systems. One possibility bringing different endpoints continuous authentication, an system. Continuous authentication set technologies capable determining if a user’s identity remains in time; whether he legitimate user (i.e., only who should know secret credentials) or been impersonated by someone else after authentication’s process was completed. does not require active participation user. Aiming identify involved implementations, evaluation methods, and its use cases, paper presents systematic review that synthesizes state art. conducted get picture about which data sources could allow systems successfully implemented, are most adequate ways data. also identifies defining dimensions
منابع مشابه
Authentication, Access Control, and Audit
—Authentication establishes the identity of one party to another. Most commonly authentication establishes the identity of a user to some part of the system, typically by means of a password. More generally, authentication can be computer-to-computer or process-toprocess and mutual in both directions. —Access control determines what one party will allow another to do with respect to resources a...
متن کاملBeyond Risk-Based Access Control: Towards Incentive-Based Access Control
In recent years, risk-based access control has been proposed as an alternative to traditional rigid access control models such as multi-level security and role-based access control. While these approaches make the risks associated with exceptional access accountable and encourage the users to take low-risk actions, they also create the disincentives for seeking necessary risky accesses. We intr...
متن کاملContext-Dependent Authentication and Access Control
As mobile computing continues to rise, users are increasingly able to connect to remote services from a wide range of settings. To provide this flexibility, security policies must be adaptive to the user’s environment when the request is made. In our work, we define context to include the spatiotemporal aspects of the user request, in addition to quantifiable environmental factors determined by...
متن کاملAuthentication and Access Control in P2P Network
Peer-to-Peer (P2P) networks are the latest addition to the universe of distributed systems. The security issues become more important then ever. Authentication and access control are the two main fields of the security issues. Different applications have different security requirements. In this paper, we analyze the settlements of the P2P Network security issues and the difficulty of the techno...
متن کاملAuthentication Mechanisms for Physical Access Control
The Smart Card Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption, use and widespread application of smart card technology. Through specific projects such as education programs, market research, advocacy, industry relations and open forums, the Alliance keeps its members connected to industry leaders and innovative thought. The Alliance is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2021
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2021/8146553