A fuzzy trust model proposal to ensure the identity of a user in time

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Access controls ensure that all direct accesses to objects are authorized by means of user identification. However, in some scenarios it is also necessary to continuously check the identity of the user in order to avoid malicious behaviors such as person exchanges immediately after the initial authentication phase. Aim of this work is to propose a methodology based on a balanced mix of strong and weak authentication techniques studied to guarantee a high and prolonged in time level of security combining the advantages of each authenticator.

Cite

CITATION STYLE

APA

Azzini, A., & Marrara, S. (2006). A fuzzy trust model proposal to ensure the identity of a user in time. In Computational Intelligence, Theory and Applications: International Conference 9th Fuzzy Days in Dortmund, Germany, Sept. 18-20, 2006 Proceedings (pp. 181–190). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-34783-6_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free