Two-Way Continual Authentication Model

Autores
Lugani, Carlos Fabián
Año de publicación
2017
Idioma
inglés
Tipo de recurso
documento de conferencia
Estado
versión publicada
Descripción
Authentication is a process by which a person using a personal computer, information system or device, defines its identity, and therefore, such system grant access based on predefined permissions. The use of biometric devices, IoT devices, wearable technology and other similar devices, define present authentication methods as weak and requires a level of mutual authentication so that both actors trust each other granting who they claim or seem to be. This paper addresses that information systems and/or devices that should validate their identity in the same way users do. Additionally, due to the increasing information security incidents, there is a risk that one of the actors, during the connection process, might be an impostor instead of a truly actor. For this reason, the authentication method should be a continuous and ongoing process in order to counteract with the security risks mentioned above.
VI Workshop de Seguridad Informática (WSI).
Red de Universidades con Carreras en Informática (RedUNCI)
Materia
Ciencias Informáticas
Authentication
Security
identity management
IoT
Nivel de accesibilidad
acceso abierto
Condiciones de uso
http://creativecommons.org/licenses/by-nc-sa/4.0/
Repositorio
SEDICI (UNLP)
Institución
Universidad Nacional de La Plata
OAI Identificador
oai:sedici.unlp.edu.ar:10915/63939

id SEDICI_f30ea2b4ad6f1e7e8ef7255bd8498595
oai_identifier_str oai:sedici.unlp.edu.ar:10915/63939
network_acronym_str SEDICI
repository_id_str 1329
network_name_str SEDICI (UNLP)
spelling Two-Way Continual Authentication ModelLugani, Carlos FabiánCiencias InformáticasAuthenticationSecurityidentity managementIoTAuthentication is a process by which a person using a personal computer, information system or device, defines its identity, and therefore, such system grant access based on predefined permissions. The use of biometric devices, IoT devices, wearable technology and other similar devices, define present authentication methods as weak and requires a level of mutual authentication so that both actors trust each other granting who they claim or seem to be. This paper addresses that information systems and/or devices that should validate their identity in the same way users do. Additionally, due to the increasing information security incidents, there is a risk that one of the actors, during the connection process, might be an impostor instead of a truly actor. For this reason, the authentication method should be a continuous and ongoing process in order to counteract with the security risks mentioned above.VI Workshop de Seguridad Informática (WSI).Red de Universidades con Carreras en Informática (RedUNCI)2017-10info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf1309-1316http://sedici.unlp.edu.ar/handle/10915/63939enginfo:eu-repo/semantics/altIdentifier/isbn/978-950-34-1539-9info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/4.0/Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T11:08:34Zoai:sedici.unlp.edu.ar:10915/63939Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 11:08:34.723SEDICI (UNLP) - Universidad Nacional de La Platafalse
dc.title.none.fl_str_mv Two-Way Continual Authentication Model
title Two-Way Continual Authentication Model
spellingShingle Two-Way Continual Authentication Model
Lugani, Carlos Fabián
Ciencias Informáticas
Authentication
Security
identity management
IoT
title_short Two-Way Continual Authentication Model
title_full Two-Way Continual Authentication Model
title_fullStr Two-Way Continual Authentication Model
title_full_unstemmed Two-Way Continual Authentication Model
title_sort Two-Way Continual Authentication Model
dc.creator.none.fl_str_mv Lugani, Carlos Fabián
author Lugani, Carlos Fabián
author_facet Lugani, Carlos Fabián
author_role author
dc.subject.none.fl_str_mv Ciencias Informáticas
Authentication
Security
identity management
IoT
topic Ciencias Informáticas
Authentication
Security
identity management
IoT
dc.description.none.fl_txt_mv Authentication is a process by which a person using a personal computer, information system or device, defines its identity, and therefore, such system grant access based on predefined permissions. The use of biometric devices, IoT devices, wearable technology and other similar devices, define present authentication methods as weak and requires a level of mutual authentication so that both actors trust each other granting who they claim or seem to be. This paper addresses that information systems and/or devices that should validate their identity in the same way users do. Additionally, due to the increasing information security incidents, there is a risk that one of the actors, during the connection process, might be an impostor instead of a truly actor. For this reason, the authentication method should be a continuous and ongoing process in order to counteract with the security risks mentioned above.
VI Workshop de Seguridad Informática (WSI).
Red de Universidades con Carreras en Informática (RedUNCI)
description Authentication is a process by which a person using a personal computer, information system or device, defines its identity, and therefore, such system grant access based on predefined permissions. The use of biometric devices, IoT devices, wearable technology and other similar devices, define present authentication methods as weak and requires a level of mutual authentication so that both actors trust each other granting who they claim or seem to be. This paper addresses that information systems and/or devices that should validate their identity in the same way users do. Additionally, due to the increasing information security incidents, there is a risk that one of the actors, during the connection process, might be an impostor instead of a truly actor. For this reason, the authentication method should be a continuous and ongoing process in order to counteract with the security risks mentioned above.
publishDate 2017
dc.date.none.fl_str_mv 2017-10
dc.type.none.fl_str_mv info:eu-repo/semantics/conferenceObject
info:eu-repo/semantics/publishedVersion
Objeto de conferencia
http://purl.org/coar/resource_type/c_5794
info:ar-repo/semantics/documentoDeConferencia
format conferenceObject
status_str publishedVersion
dc.identifier.none.fl_str_mv http://sedici.unlp.edu.ar/handle/10915/63939
url http://sedici.unlp.edu.ar/handle/10915/63939
dc.language.none.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv info:eu-repo/semantics/altIdentifier/isbn/978-950-34-1539-9
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
http://creativecommons.org/licenses/by-nc-sa/4.0/
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-sa/4.0/
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
dc.format.none.fl_str_mv application/pdf
1309-1316
dc.source.none.fl_str_mv reponame:SEDICI (UNLP)
instname:Universidad Nacional de La Plata
instacron:UNLP
reponame_str SEDICI (UNLP)
collection SEDICI (UNLP)
instname_str Universidad Nacional de La Plata
instacron_str UNLP
institution UNLP
repository.name.fl_str_mv SEDICI (UNLP) - Universidad Nacional de La Plata
repository.mail.fl_str_mv alira@sedici.unlp.edu.ar
_version_ 1844615958304391168
score 13.070432