Two-Way Continual Authentication Model
- Autores
- Lugani, Carlos Fabián
- Año de publicación
- 2017
- Idioma
- inglés
- Tipo de recurso
- documento de conferencia
- Estado
- versión publicada
- Descripción
- Authentication is a process by which a person using a personal computer, information system or device, defines its identity, and therefore, such system grant access based on predefined permissions. The use of biometric devices, IoT devices, wearable technology and other similar devices, define present authentication methods as weak and requires a level of mutual authentication so that both actors trust each other granting who they claim or seem to be. This paper addresses that information systems and/or devices that should validate their identity in the same way users do. Additionally, due to the increasing information security incidents, there is a risk that one of the actors, during the connection process, might be an impostor instead of a truly actor. For this reason, the authentication method should be a continuous and ongoing process in order to counteract with the security risks mentioned above.
VI Workshop de Seguridad Informática (WSI).
Red de Universidades con Carreras en Informática (RedUNCI) - Materia
-
Ciencias Informáticas
Authentication
Security
identity management
IoT - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- http://creativecommons.org/licenses/by-nc-sa/4.0/
- Repositorio
- Institución
- Universidad Nacional de La Plata
- OAI Identificador
- oai:sedici.unlp.edu.ar:10915/63939
Ver los metadatos del registro completo
id |
SEDICI_f30ea2b4ad6f1e7e8ef7255bd8498595 |
---|---|
oai_identifier_str |
oai:sedici.unlp.edu.ar:10915/63939 |
network_acronym_str |
SEDICI |
repository_id_str |
1329 |
network_name_str |
SEDICI (UNLP) |
spelling |
Two-Way Continual Authentication ModelLugani, Carlos FabiánCiencias InformáticasAuthenticationSecurityidentity managementIoTAuthentication is a process by which a person using a personal computer, information system or device, defines its identity, and therefore, such system grant access based on predefined permissions. The use of biometric devices, IoT devices, wearable technology and other similar devices, define present authentication methods as weak and requires a level of mutual authentication so that both actors trust each other granting who they claim or seem to be. This paper addresses that information systems and/or devices that should validate their identity in the same way users do. Additionally, due to the increasing information security incidents, there is a risk that one of the actors, during the connection process, might be an impostor instead of a truly actor. For this reason, the authentication method should be a continuous and ongoing process in order to counteract with the security risks mentioned above.VI Workshop de Seguridad Informática (WSI).Red de Universidades con Carreras en Informática (RedUNCI)2017-10info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf1309-1316http://sedici.unlp.edu.ar/handle/10915/63939enginfo:eu-repo/semantics/altIdentifier/isbn/978-950-34-1539-9info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/4.0/Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T11:08:34Zoai:sedici.unlp.edu.ar:10915/63939Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 11:08:34.723SEDICI (UNLP) - Universidad Nacional de La Platafalse |
dc.title.none.fl_str_mv |
Two-Way Continual Authentication Model |
title |
Two-Way Continual Authentication Model |
spellingShingle |
Two-Way Continual Authentication Model Lugani, Carlos Fabián Ciencias Informáticas Authentication Security identity management IoT |
title_short |
Two-Way Continual Authentication Model |
title_full |
Two-Way Continual Authentication Model |
title_fullStr |
Two-Way Continual Authentication Model |
title_full_unstemmed |
Two-Way Continual Authentication Model |
title_sort |
Two-Way Continual Authentication Model |
dc.creator.none.fl_str_mv |
Lugani, Carlos Fabián |
author |
Lugani, Carlos Fabián |
author_facet |
Lugani, Carlos Fabián |
author_role |
author |
dc.subject.none.fl_str_mv |
Ciencias Informáticas Authentication Security identity management IoT |
topic |
Ciencias Informáticas Authentication Security identity management IoT |
dc.description.none.fl_txt_mv |
Authentication is a process by which a person using a personal computer, information system or device, defines its identity, and therefore, such system grant access based on predefined permissions. The use of biometric devices, IoT devices, wearable technology and other similar devices, define present authentication methods as weak and requires a level of mutual authentication so that both actors trust each other granting who they claim or seem to be. This paper addresses that information systems and/or devices that should validate their identity in the same way users do. Additionally, due to the increasing information security incidents, there is a risk that one of the actors, during the connection process, might be an impostor instead of a truly actor. For this reason, the authentication method should be a continuous and ongoing process in order to counteract with the security risks mentioned above. VI Workshop de Seguridad Informática (WSI). Red de Universidades con Carreras en Informática (RedUNCI) |
description |
Authentication is a process by which a person using a personal computer, information system or device, defines its identity, and therefore, such system grant access based on predefined permissions. The use of biometric devices, IoT devices, wearable technology and other similar devices, define present authentication methods as weak and requires a level of mutual authentication so that both actors trust each other granting who they claim or seem to be. This paper addresses that information systems and/or devices that should validate their identity in the same way users do. Additionally, due to the increasing information security incidents, there is a risk that one of the actors, during the connection process, might be an impostor instead of a truly actor. For this reason, the authentication method should be a continuous and ongoing process in order to counteract with the security risks mentioned above. |
publishDate |
2017 |
dc.date.none.fl_str_mv |
2017-10 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/conferenceObject info:eu-repo/semantics/publishedVersion Objeto de conferencia http://purl.org/coar/resource_type/c_5794 info:ar-repo/semantics/documentoDeConferencia |
format |
conferenceObject |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://sedici.unlp.edu.ar/handle/10915/63939 |
url |
http://sedici.unlp.edu.ar/handle/10915/63939 |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/isbn/978-950-34-1539-9 |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
dc.format.none.fl_str_mv |
application/pdf 1309-1316 |
dc.source.none.fl_str_mv |
reponame:SEDICI (UNLP) instname:Universidad Nacional de La Plata instacron:UNLP |
reponame_str |
SEDICI (UNLP) |
collection |
SEDICI (UNLP) |
instname_str |
Universidad Nacional de La Plata |
instacron_str |
UNLP |
institution |
UNLP |
repository.name.fl_str_mv |
SEDICI (UNLP) - Universidad Nacional de La Plata |
repository.mail.fl_str_mv |
alira@sedici.unlp.edu.ar |
_version_ |
1844615958304391168 |
score |
13.070432 |