Difference between revisions of "Progressive Authentication"

From MgmtWiki
Jump to: navigation, search
(Created page with "==Full Definition or Meme== When the exact nature of the user request is unknown, it is best to authentication in the least obtrusive manner, which is typically not at the hig...")
 
(Context)
Line 3: Line 3:
  
 
==Context==
 
==Context==
 +
 +
NSA Blacker
  
 
When mobile device became common it was early realized that the blacker solution was not feasible and progressive authentication was proposed<ref>Oriana Riva +3 ''Progressive authentication: deciding when to authenticate on mobile phones'' Published in: Proceedings Security'12 Proceedings of the 21st USENIX conference on Security symposium Pages 15-15 Bellevue, WA — August 08 - 10, 2012</ref>
 
When mobile device became common it was early realized that the blacker solution was not feasible and progressive authentication was proposed<ref>Oriana Riva +3 ''Progressive authentication: deciding when to authenticate on mobile phones'' Published in: Proceedings Security'12 Proceedings of the 21st USENIX conference on Security symposium Pages 15-15 Bellevue, WA — August 08 - 10, 2012</ref>
 
  
 
==Problems==
 
==Problems==

Revision as of 20:38, 14 June 2018

Full Definition or Meme

When the exact nature of the user request is unknown, it is best to authentication in the least obtrusive manner, which is typically not at the highest level they might need later in the interchange.

Context

NSA Blacker

When mobile device became common it was early realized that the blacker solution was not feasible and progressive authentication was proposed[1]

Problems

Solutions

References

  1. Oriana Riva +3 Progressive authentication: deciding when to authenticate on mobile phones Published in: Proceedings Security'12 Proceedings of the 21st USENIX conference on Security symposium Pages 15-15 Bellevue, WA — August 08 - 10, 2012