Difference between revisions of "Progressive Authentication"
From MgmtWiki
(Created page with "==Full Definition or Meme== When the exact nature of the user request is unknown, it is best to authentication in the least obtrusive manner, which is typically not at the hig...") |
(→Context) |
||
Line 3: | Line 3: | ||
==Context== | ==Context== | ||
+ | |||
+ | NSA Blacker | ||
When mobile device became common it was early realized that the blacker solution was not feasible and progressive authentication was proposed<ref>Oriana Riva +3 ''Progressive authentication: deciding when to authenticate on mobile phones'' Published in: Proceedings Security'12 Proceedings of the 21st USENIX conference on Security symposium Pages 15-15 Bellevue, WA — August 08 - 10, 2012</ref> | When mobile device became common it was early realized that the blacker solution was not feasible and progressive authentication was proposed<ref>Oriana Riva +3 ''Progressive authentication: deciding when to authenticate on mobile phones'' Published in: Proceedings Security'12 Proceedings of the 21st USENIX conference on Security symposium Pages 15-15 Bellevue, WA — August 08 - 10, 2012</ref> | ||
− | |||
==Problems== | ==Problems== |
Revision as of 20:38, 14 June 2018
Full Definition or Meme
When the exact nature of the user request is unknown, it is best to authentication in the least obtrusive manner, which is typically not at the highest level they might need later in the interchange.
Context
NSA Blacker
When mobile device became common it was early realized that the blacker solution was not feasible and progressive authentication was proposed[1]
Problems
Solutions
References
- ↑ Oriana Riva +3 Progressive authentication: deciding when to authenticate on mobile phones Published in: Proceedings Security'12 Proceedings of the 21st USENIX conference on Security symposium Pages 15-15 Bellevue, WA — August 08 - 10, 2012